Mobile driving license system deployment model with security enhancement
نویسندگان
چکیده
منابع مشابه
License Negotiation System for Mobile P2p Environment
Due to the swift development of mobile devices, the markets of mobile content business have grown rapidly during the recent years. This development has contributed to a fast introduction of mobile DRM technologies applied to the protection of content against illegal distribution enabled by short range messaging protocols and upcoming mobile peer-to-peer networking. Although the traditional peer...
متن کاملSecurity Enhancement for Mobile WiMAX Network
Security in wireless networks has traditionally been considered to be an issue to be addressed at the higher layers of the network.IEEE 802.16, known as WiMAX, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. ...
متن کاملSecurity mistakes in information system deployment projects
To secure information systems from malicious attacks have become an increasingly important task in most businesses today. A common way of approaching this problem is to think of securing systems as removing vulnerabilities in them. What defines a vulnerability is however multifaceted. Vulnerabilities are often seen as mistakes made during the development of the system and that have potentially ...
متن کاملOptimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach
Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...
متن کاملOS Security Enhancement System by Considering Security Level
Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical and Applied Cybersecurity
سال: 2020
ISSN: 2708-1397,2664-2913
DOI: 10.20535/tacs.2664-29132020.1.209436