نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

Journal: :The International Conference on Electrical Engineering 2012

Journal: :IEICE Transactions on Information and Systems 2020

Journal: :International Journal of Computer Applications 2017

2014
René Guillaume Andreas Mueller Christian T. Zenger Christof Paar Andreas Czylwik Robert Bosch

The generation of symmetric cryptographic keys out of wireless channel properties represents a promising approach for the establishment of secured communication links. Despite the tremendous number of different channel-based key generation protocols, there is little research on security evaluation and fair comparison of those systems. We present suitable metrics and a source model for a securit...

Journal: :IJSSE 2012
Sandra Trösterer Elke Beck Fabiano Dalpiaz Elda Paja Paolo Giorgini Manfred Tscheligi

Developing a security modeling language is a complex activity. Particularly, it becomes very challenging for Security Requirements Engineering (SRE) languages where social/organizational concepts are used to represent high-level business aspects, while security aspects are typically expressed in a technical jargon at a lower level of abstraction. In order to reduce this socio-technical mismatch...

Journal: :TIIS 2011
Heasuk Jo Seungjoo Kim Dongho Won

Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues with...

2000
Kai Rannenberg

IT security certification and IT security evaluation criteria have changed their character compared with the first efforts ca. 20 years ago. They have also gained more interest within civilian and commercial application areas. Therefore this paper compares them with earlier criticism and with the new challenges in IT security. After an introduction into the concept of security certification the...

Journal: :JSW 2011
Li Jiang Hao Chen Fei Deng Qiusheng Zhong

Web service is a distributed computing model constructed on the basis of open standard technology with the characteristics of loose coupling, language neutrality, platform-independence, etc., how to efficiently evaluate the security of Web service is a challenging research topic. Current researches concern more about the testing of Web service and rarely about the issue of service security eval...

2000
Mariki M. Eloff Sebastiaan H. von Solms

Effective management in any organisation requires a holistic approach in focusing on information security. Senior managers have to know how well their organisations are perfonning as measured against internationally accepted best practices. Part of the information security management problem is that it is viewed either from a technological perspective focussing on product evaluation only, or fr...

Journal: :IEEJ Transactions on Industry Applications 2004

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید