نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Identifying authorship correctly and efficiently is a difficult problem when the literature is abundant, but poorly recorded. Homonyms are tedious to differentiate. This paper describes how the field of economics has organized itself with respect to author identification. We describe the RePEc project with a special emphasis on the RePEc Author Service. We then discuss how the concept is curren...
The past several years we have witnessed that information has become the most precious asset, while protection and security of information is becoming an ever greater challenge due to the large amount of knowledge necessary for organizations to successfully withstand external threats and attacks. This knowledge collected from the domain of information security can be formally described by secur...
Current level of the open and distributed systems deployment and development implies the need of both security and trust analysis, in particular for Remote Entrusting approach developed in RE-TRUST Project. Research in this field is reflected in a large list of papers. And in various papers there are different understandings of such notions like «security analysis» and «trust analysis», related...
After arXiv.org, the RePEc economics library offers the second-largest source of freely downloadable scientific preprints in the world. RePEc has a different business model and a different content coverage than arXiv.org. This paper addresses both
In the spring of 2006, I taught a graduate student research seminar on usable security at Brigham Young University (BYU). It was likely one of the first graduate seminars devoted exclusively to the nascent field of usable security. The course consisted primarily of readings from Security and Usability, a collection of papers in the field that had recently been edited by Cranor and Garfinkel [2]...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
− The use of ontologies and taxonomies contributes by providing means to define concepts, minimize the ambiguity, improve the interoperability and manage knowledge of the security domain. Thus, this paper presents a literature survey on ontologies and taxonomies concerning the Security Assessment domain. We carried out it to uncover initiatives that aim at formalizing concepts from the “Informa...
The 19 papers in these Proceedings were presented at the 2001 IEEE Symposium on Security and Privacy, held May 14-16 2001 at the Claremont Resort in Oakland, California, USA. These papers were selected from 107 submissions on all areas of computer security and privacy from authors worldwide. The selected papers were chosen on the basis of excellence of scientific contribution by a program commi...
The Open Web Application Security Project (OWASP) is dedicated to finding and fighting the causes of insecure software. The OWASP AppSec conferences bring together application security experts, researchers and practitioners from all over the world. Industry and academia can meet to discuss open problems and new solutions in application security. This report bundles the papers accepted for prese...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید