Guest Editorial: Business, Human Rights and Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial: Security and Dependability in SOA and Business Processes

THIS special issue presents recent research results in a field of research that is itself rather new. When Service Oriented Architectures (SOA) came of age, no specific security technology for web services was available and transport protocols security mechanisms were used instead. For instance, web services message confidentiality was achieved using transport security protocols like SSL and HT...

متن کامل

Guest Editorial : Wireless Physical Layer Security

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...

متن کامل

Guest Editorial: Advances in Applied Security

In this special issue, we have selected five papers from the 6th International Conference on Availability, Reliability and Security (ARES 2011)1 and its workshops to show the breadth of research. The ARES conference brings together researchers and practitioners in the area of security. ARES highlights the various aspects of security—with special focus on the crucial linkage between availability...

متن کامل

Guest Editorial Special Issue on Information Security

⎯Recently, an edge adaptive image steganographic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the pr...

متن کامل

Guest Editorial: Emerging Software Reliability and System Security Technologies

Due to the quick development of mobile, ubiquitous, cloud, network and communication systems and applications, many computer and communication systems, wired or wireless, have been proposed to provide their users (human or other systems) with different services. However, hackers may anytime and anywhere attack these systems for stealing a company’s business secrets or a person’s credit card inf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Business and Human Rights Journal

سال: 2019

ISSN: 2057-0198,2057-0201

DOI: 10.1017/bhj.2018.31