نتایج جستجو برای: security concern
تعداد نتایج: 277671 فیلتر نتایج به سال:
Security has recently become a major concern in distributed geo-infrastructures for spatial data provision. Thus, a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed. The first part of this article presents a survey of current security mechanisms for authentication and authorisation. Based on this survey, a lightweight and scalable token-...
Agent oriented applications and agent-based systems are increasingly demanding security guarantees that concern confidentiality, integrity, availability, accounting and non-repudiation in order to be deployed in business applications such as e-commerce, e-finance that include both B2B and B2C transactions. This paper considers the main challenges concerning security that need to be overcome for...
Although computer security is a concern for online users, many have difficulty making effective security decisions. Auction Hero is a simulation game modeling life online that aims to improve users’ mental models of computer security and help users make more secure decisions. It attempts to simulate real life by making security a secondary consideration that requires vigilance but that may not ...
According to the problem of the uncertain information is difficult to quantify in information systems security risk analysis process, proposed an information system security risk analysis method based on information entropy. This method use information entropy to measure the risk of information systems, introduce the information entropy theory, and get the value of the risk of various risk fact...
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudi...
My research interests are in building secure systems. I am especially interested in the interactions between theoretical approaches to security, the principles of systems design, and human factors that affect security in real-world systems. As we entrust ever more of our lives to the correct operation of complex interconnected systems, the security of these systems in an increasingly important ...
In the realm of information systems (IS) security, a plethora of standards have come into existence. Too many IS security standards have been proposed, which an organization could adopt to secure its information systems. On what criteria then an organization shall base its decision as to what standards need to be implemented? We address this concern employing basic economic concepts. The core a...
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established developmen...
Due to advances in silicon manufacturing technology, Radio Frequency Identification (RFID) systems are useful in many applications such as automobile immobilizers, animal tracking, payment systems, automatic toll collection and inventory management. As RFID systems use both radio and wire communication, security issues become a critical concern. However, even if security and privacy solutions h...
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید