نتایج جستجو برای: security papers

تعداد نتایج: 265761  

2010
Peter G. Neumann Matt Bishop Sean Peisert Marvin Schaefer

This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have provided significant leadership in creating and ...

Journal: :IEEE Security & Privacy 2015
Terry V. Benzel

F or 35 years, the IEEE Symposium on Security and Privacy has provided a venue for leading researchers in security and privacy to gather. It continues to be the premier forum for presenting developments in computer security and electronic privacy and for bringing together researchers and practitioners. Th e topics covered at the symposium have varied over the years, yet the work presented has a...

2017
Alexandra Durcikova Murray E. Jennex

During the five years of existence of this minitrack, we have published fourteen papers that focus on the intersection of knowledge management and organizational or individual security. Ilvonen, Jusilla, Kärkkäinen, and Paivarint (2015), Ilvonen, Alnne, Helander, and Vayrunen (2016), and Sarigianni, Thallmann, and Manhart (2016) focus on how to protect shared knowledge either within the organiz...

2017
Sebastian Sowa Lampros Tsinas Hanno Lenz Roland Gabriel

Previous papers mostly dealt with specific views of information security management (either technical, organizational for instance). Recently, major progress has been achieved in the development of a business driven approach with BORIS (Business Oriented management of Information Security) and a process-oriented approach called ORBIT (Operational Risks in Business and IT). An integrated framewo...

2001
Jason Lee Rogers

0278-6648/03/$17.00 © 2003 IEEE 33 he events of 11 September 2001 sent a ripple of fear across the United States. The US government sought to alleviate the increased concerns by enforcing strict security in airports, government buildings and athletic stadiums; however, with any security there is a price. For airline passengers that price was long lines caused by multiple security checks placed ...

2008

Organizations know that investing in security measures is an important requirement for doing business. But how much should they invest and how should those investments be directed? Many organizations have turned to a risk management approach to identify the largest threats and the control measures that could mitigate those threats. These papers present a framework to help in an analysis of the ...

Journal: :IACR Cryptology ePrint Archive 2007
Ran Canetti Ling Cheung Nancy A. Lynch Olivier Pereira

In a series of papers, Küsters et al. investigated the relationships between various notions of simulation-based security. Two main factors, the placement of a “master process” and the existence of “forwarder processes”, were found to affect the relationship between different definitions. In this extended abstract, we add a new dimension to the analysis of simulation-based security, namely, the...

Abouali Vedadhir, Masoumeh Simbar, Sedigheh Moghasemi,

Abstract   Introduction: Looking at the role of midwives and the need to invest in this profession in order to achieve development objectives. Objective: The aim of this study is to review the characteristics of midwifery care presentation models in the world as well as in Iran and investigate its challenges in the country. Materials and Methods: This study is a review done in 2016. Fi...

2016
Iffat A. Gheyas Ali E. Abdallah

Cyber security is vital to the success of today’s digital economy. The major security threats are coming from within, as opposed to outside forces. Insider threat detection and prediction are important mitigation techniques. This study addresses the following research questions: 1) what are the research trends in insider threat detection and prediction nowadays? 2) What are the challenges assoc...

ژورنال: مجله طب نظامی 2021

Background and Aims: The crisis of Rohingya Muslim refugees has become one of the challenging issues of the last decade. The organized massacre of Rohingya people in Myanmar has forced them to relocate to Bangladesh, creating the worldchr('39')s largest refugee camp. The purpose of this study is to assess the health status of these refugees. Methods: The present study was conducted using a syst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید