نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
Security is a critical parameter for the expansion and wide usage of agent technology. A threat model is constructed and subsequently the basic techniques to deal effectively with these threats are analyzed. Then this paper presents a dynamic, extensible, configurable and interoperable security architecture for mobile agent systems. It is explained how this architecture can be used to tackle a ...
BACKGROUND Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. METHODS Information security was assessed for risk, based on the inform...
As the impact of the information breaches to the information systems increases, organizations have a tendency not only to increase the information security budget but also to be sensitive to the information security expense. Organizations are faced with different types of security threats and they have several alternative technologies to mitigate the negative effects of the security threats. Mo...
The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in t...
The rapid growth of Wireless Network has raised a great concern for security threats. Currently, security is regarded as one of the critical parameter for the acceptance of any wireless networking technology. Any node under attack in wireless network presents an anomalous behavior called the malicious behavior. In this circumstance, the entire operation of a network gets troubled and to prevent...
The risks involved in Information Technology Outsourcing has since long been known to affect business decisions of whether to outsource or not. This has lead to numerous research on topics such as: Understanding and Managing Outsourcing Risks, Methodologies to measure Outsourcing Risks, Risk Factors in Information Technology Outsourcing, Assessing the Risk of IT Outsourcing to name a few. But v...
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand against this threats. The following paper presents a summary of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید