Communication system information resource security breach model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disclosure of Information Theft: The ChoicePoint Security Breach

n recent months, the media have reported several major securi ty breaches. Hackers have stolen the personal information of thousands of individuals from leading banks, credit bureaus, and insurance companies. In other cases, computers and disks with highly confidential data have simply vanished at the airport security counter or from vehicles parked in the company lot. Stolen data may include s...

متن کامل

Information Security as a Resource

The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin ...

متن کامل

Special Section on Information and Communication System Security

1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Collection "Information technology and security"

سال: 2019

ISSN: 2518-1033,2411-1031

DOI: 10.20535/2411-1031.2019.7.1.184217