نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2012
Foroogh Shami Faranak Shamsafar Hadi Seyedarabi

In cyberspace security of private data is a prominent issue. Beside the reliable algorithm for automatic authentication, providing the security of the server database is considerable. In this paper a technique to secure the database of an iris-based biometric system is proposed. We employed visual cryptography, permutation and a block-based saving procedure to protect the template from maliciou...

2015
Osman Gül

This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas throu...

2009
Sheng-Chi Tseng Der-Ming Liou

The health record in the Electronic Health Record (EHR) system is more sensitive than demographic. It raises the important issue for the EHR requirement in privacy, security, audit trail, patient access, and archiving and data retention. The studies about the EHR system security are deficient. The aim of this study is to build a security environment for the EHR system by Integrating the Healthc...

2010
Jangseong Kim Joonsang Baek Kwangjo Kim Jianying Zhou

Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to search an alternative service using multiple keywords. To deal with this...

2017
Priti Sharma

Ubiquitous computing is a concept where computing is made to appear everywhere using any device, in an in any location and in any format. In this paper we have discussed the properties and applications of Ubiquitous Computing. We have also discussed some of the security challenges for Ubiquitous Computing and various security attacks on Ubiquitous Computing Networks. Keywords— Ubiquitous, Senso...

Journal: :Computer Standards & Interfaces 2005
Qiang Tang Chris J. Mitchell

In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.

2013
Anton Biasizzo Franc Novak Jozef Stefan

In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;

2015
A Michaela Vašková

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the prot...

2008
Zoran S. Bojkovic Bojan M. Bakmaz Miodrag R. Bakmaz

This work deals with some security issues over wireless sensor networks (WSNs). A survey of recent trends in general security requirements, typical security treats, intrusion detection system, key distribution schemes and target localization is presented. In order to facilitate applications that require packet delivery from one or more senders to multiple receivers, provisioning security in gro...

2010
Reijo M. Savola Habtamu Abie

Systematically developed security metrics make it possible to gather sufficient and credible security evidence for runtime adaptive security management and off-line security engineering and management. This study introduces and analyzes security metrics and parameter dependencies for one particular distributed messaging system. The focus is on the effectiveness and correctness of security-enfor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید