Guest Editorial: Business, Human Rights and Security
نویسندگان
چکیده
منابع مشابه
Guest Editorial: Security and Dependability in SOA and Business Processes
THIS special issue presents recent research results in a field of research that is itself rather new. When Service Oriented Architectures (SOA) came of age, no specific security technology for web services was available and transport protocols security mechanisms were used instead. For instance, web services message confidentiality was achieved using transport security protocols like SSL and HT...
متن کاملGuest Editorial : Wireless Physical Layer Security
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...
متن کاملGuest Editorial: Advances in Applied Security
In this special issue, we have selected five papers from the 6th International Conference on Availability, Reliability and Security (ARES 2011)1 and its workshops to show the breadth of research. The ARES conference brings together researchers and practitioners in the area of security. ARES highlights the various aspects of security—with special focus on the crucial linkage between availability...
متن کاملGuest Editorial Special Issue on Information Security
⎯Recently, an edge adaptive image steganographic method based on least significant bit (LSB) matching revisited (EA-LSBMR) has been proposed, which holds good visual quality and proper security under appropriate embedding rates. However, from the extensive experiments to EA-LSBMR, we find that the discrete Fourier transform (DFT) spectrum of pixelpairs differences histogram still reveals the pr...
متن کاملGuest Editorial: Emerging Software Reliability and System Security Technologies
Due to the quick development of mobile, ubiquitous, cloud, network and communication systems and applications, many computer and communication systems, wired or wireless, have been proposed to provide their users (human or other systems) with different services. However, hackers may anytime and anywhere attack these systems for stealing a company’s business secrets or a person’s credit card inf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Business and Human Rights Journal
سال: 2019
ISSN: 2057-0198,2057-0201
DOI: 10.1017/bhj.2018.31