نتایج جستجو برای: security concern

تعداد نتایج: 277671  

Journal: :Int. J. Digital Earth 2014
Bernd Resch Bernhard Schulz Manfred Mittlböck Thomas Heistracher

Security has recently become a major concern in distributed geo-infrastructures for spatial data provision. Thus, a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed. The first part of this article presents a survey of current security mechanisms for authentication and authorisation. Based on this survey, a lightweight and scalable token-...

2001
Stefan Poslad Patricia Charlton Monique Calisti

Agent oriented applications and agent-based systems are increasingly demanding security guarantees that concern confidentiality, integrity, availability, accounting and non-repudiation in order to be deployed in business applications such as e-commerce, e-finance that include both B2B and B2C transactions. This paper considers the main challenges concerning security that need to be overcome for...

2011
Sonia Chiasson

Although computer security is a concern for online users, many have difficulty making effective security decisions. Auction Hero is a simulation game modeling life online that aims to improve users’ mental models of computer security and help users make more secure decisions. It attempts to simulate real life by making security a secondary consideration that requires vigilance but that may not ...

2015
Sha Fu Zhongli Liu Hangjun Zhou Wenbin Liu Bo Li

According to the problem of the uncertain information is difficult to quantify in information systems security risk analysis process, proposed an information system security risk analysis method based on information entropy. This method use information entropy to measure the risk of information systems, introduce the information entropy theory, and get the value of the risk of various risk fact...

Journal: :Computers & Security 2015
Izzat Alsmadi Dianxiang Xu

Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudi...

2005
Geetanjali Sampemane

My research interests are in building secure systems. I am especially interested in the interactions between theoretical approaches to security, the principles of systems design, and human factors that affect security in real-world systems. As we entrust ever more of our lives to the correct operation of complex interconnected systems, the security of these systems in an increasingly important ...

2005
Gurvirender Tejay

In the realm of information systems (IS) security, a plethora of standards have come into existence. Too many IS security standards have been proposed, which an organization could adopt to secure its information systems. On what criteria then an organization shall base its decision as to what standards need to be implemented? We address this concern employing basic economic concepts. The core a...

2009
Jane E. Sinclair

When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established developmen...

2006
Anne Wei Benoît Geller GuoZhi Wei Selma Boumerdassi Éric Renault

Due to advances in silicon manufacturing technology, Radio Frequency Identification (RFID) systems are useful in many applications such as automobile immobilizers, animal tracking, payment systems, automatic toll collection and inventory management. As RFID systems use both radio and wire communication, security issues become a critical concern. However, even if security and privacy solutions h...

Journal: :CoRR 2008
Vaibhav Gowadia Csilla Farkas Michiharu Kudo

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید