Communication system information resource security breach model
نویسندگان
چکیده
منابع مشابه
Disclosure of Information Theft: The ChoicePoint Security Breach
n recent months, the media have reported several major securi ty breaches. Hackers have stolen the personal information of thousands of individuals from leading banks, credit bureaus, and insurance companies. In other cases, computers and disks with highly confidential data have simply vanished at the airport security counter or from vehicles parked in the company lot. Stolen data may include s...
متن کاملInformation Security as a Resource
The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin ...
متن کاملSpecial Section on Information and Communication System Security
1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Collection "Information technology and security"
سال: 2019
ISSN: 2518-1033,2411-1031
DOI: 10.20535/2411-1031.2019.7.1.184217