نتایج جستجو برای: security needs

تعداد نتایج: 415429  

Journal: :IJSSE 2011
Walid Al-Ahmad

Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for security design and development; security is usually an afterthought activity. This paper discusses the integration of XP with security activities base...

Journal: :international journal of agricultural management and development 2011
nsikak-abasi a etim sunday okon iniobong a. akpabio

as cost of living rises and people’s wages / salaries do not cover their basic food and dietary needs, interest in parttime farming has risen. part-time farming activities are being practiced by different people as a food security strategy from vulnerable households. but these part-time farms have had limited success in providing food/nutrition security, increasing incomes and improving well-be...

2013

Purpose In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors wrongly identified or unidentified vulnerabilities can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business assets suf...

2011
Theodoros Ntouskas Dimitrios Papanikas Nineta Polemi

Although small, medium and micro enterprises (SMEs, mEs) play a decisive role in the European digital economy, they have been identified as one of the weakest links in information security. Identifying these security weaknesses and needs we parameterize our open collaborative environment STORM in order to offer a cost-efficient tool to the SMEs and mEs for self-managing their security.

2002
Makan Pourzandi Ibrahim Haddad Charles Levert Miroslaw Zakrzewski Michel Dagenais

Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective hardware and software. Efficient cluster security is now an essential requirement and has not yet been addressed in a coherent fashion on clustered systems. This paper presents an approach for distributed security archit...

2010
Johannes Loinig Christian Steger Reinhold Weiss Ernst Haselsteiner

Most modern embedded systems include an operating system. Not all functions in the operating systems have to fulfill the same security requirements. In this work we propose a mechanism to identify and maintain functions that have to meet strict security needs. This mechanism is based on annotations representing security constrains and assertions to check these security annotations during the ve...

2014
Ahmed AlKalbani

The rapid development of e-government across the world has exposed critical information in public organizations to the possibility of cybercrime. Information security has become a critical issue that needs to be adequately addressed in e-government development. This paper proposes a conceptual framework for information security compliance. The proposed framework, consisting of four dimensions o...

2002
Makan Pourzandi Ibrahim Haddad Charles Levert Miroslaw Zakrzewski Michel Dagenais

Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective hardware and software. Efficient cluster security is now an essential requirement and has not yet been addressed in a coherent fashion on clustered systems. This paper presents an approach for distributed security archit...

Journal: :IEEE Software 2014
Jane Cleland-Huang

in many cases people perform only a cursory security analysis and produce rather generic security requirements. But is this the right way to build secure software? Are security requirements so similar across projects that we simply don’t need to invest the time to explore product-level needs or to document requirements at an individual level for each project? Can we instead rely on business-asu...

2006
Song Y. Yan Glyn James Gongyi Wu

By far the most important automated tool for network and communications security is encryption, but encryption itself needs security. As we know, many cryptosystems and cryptographic protocols are based their security on some computationally intractable mathematical problems. In this paper, we shall discuss some of the number-theoretic problems that are currently polynomially uncomputable and t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید