نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

2006
Yun Bai

This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through...

Journal: :Human Rights Quarterly 2012

Journal: :Mongolian Journal of International Affairs 2014

Journal: :Political Science Quarterly 2001

2014
Sangseo Park

This study looks into the employment of deterrence to reduce security breaches within organisations. The result reveals that current deterrence is less influential. This study suggests that organisations should shift towards the detection of violations and the identification of perpetrators. The research also presents a conceptual architecture of multiple strategies. Keywords— Information Secur...

Journal: :Journal of the Medical Library Association : JMLA 2015

Journal: :Academic Medicine 1990

2012
Juhi Sharma Kshitiz Saxena

As more and more industries are moving towards Cloud Computing, with tremendous data being generated every hour, the need of the hour is not just 24X7 availability but also security. In this paper we shall discuss security concerns in Cloud Computing and shall also suggest some measures to improve security. Keywords— Cloud Computing, Hypervisor, Intrusion Detection.

2011
Smriti Jain Maya Ingle

Security level, security performance, and security indicators have become standard terms to define security metrics. The data derived from these metrics helps in measurement of software security. The metrics help achieve security objectives – confidentiality, integrity and availability. The security can be assessed for further improvement during development process of the software or the produc...

2017
Violeta Damjanovic-Behrendt

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید