نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

2006
Aweke Lemma Stefan Katzenbeisser Mehmet Celik Michiel van der Veen

Secure watermark embedding allows to securely embed a watermark into a piece of content at an untrusted user device without compromising the security of the watermark key, the watermark or the original. In this paper, we show how secure watermark embedding for MPEG-2 compressed video streams can be implemented by combining traditional watermarking schemes with techniques from partial encryption.

2014
Anna Lyons Gernot Heiser

We explore a model for mixed-criticality support in seL4, a high-assurance microkernel designed for real-world use. Specifically we investigate how the seL4 model can be extended without compromising its security properties and its generalpurpose nature, including high average-case performance. The proposed model introduces reservations, with admission control performed at user level, similar t...

Journal: :CoRR 2017
Aditya Gune

Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores mo...

2011
Sherly Abraham InduShobha N. Chengalur-Smith

This paper examines the suitability of institutional theory in explaining the design and implementation of information security policies in organizations. We conduct a case study in a large governmental organization in the United States. We capture multiple perspectives among the different groups in the organization and examine how this affects the design and implementation of security policies...

2015
Heru Susanto Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefor...

2014
Rima Addas Ning Zhang

Information security and privacy in the e-health domain is an issue of growing concern. The adoption of electronic patient records, increased regulation, provider collaboration and the increased need for a faster information exchange between patients, providers and payers, all point to the need for a better information security. Therefore, the aim of this paper is to provide secure access to el...

Journal: :Journal of International Analytics 2015

Journal: :Полис. Политические исследования 2005

Journal: :Bulletin of the Angarsk State Technical University 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید