نتایج جستجو برای: security threats

تعداد نتایج: 201039  

2000
Stamatis Karnouskos

Security is a critical parameter for the expansion and wide usage of agent technology. A threat model is constructed and subsequently the basic techniques to deal effectively with these threats are analyzed. Then this paper presents a dynamic, extensible, configurable and interoperable security architecture for mobile agent systems. It is explained how this architecture can be used to tackle a ...

2011
Stein R Bolle Per Hasvold Eva Henriksen

BACKGROUND Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. METHODS Information security was assessed for risk, based on the inform...

2006
Tae-Sung Kim Chandrasekhar Subramaniam Sungjune Park Ram Kumar

As the impact of the information breaches to the information systems increases, organizations have a tendency not only to increase the information security budget but also to be sensitive to the information security expense. Organizations are faced with different types of security threats and they have several alternative technologies to mitigate the negative effects of the security threats. Mo...

2013
Qusay Idrees Sarhan

The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...

Journal: :Journal of the American Medical Informatics Association : JAMIA 2003
Jeffery Collmann Adil Laui Dan Nguyen David Lindisch

The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in t...

2013
G. Padmavathi

The rapid growth of Wireless Network has raised a great concern for security threats. Currently, security is regarded as one of the critical parameter for the acceptance of any wireless networking technology. Any node under attack in wireless network presents an anomalous behavior called the malicious behavior. In this circumstance, the entire operation of a network gets troubled and to prevent...

2006
P. Gaonjur C. Bokhoree

The risks involved in Information Technology Outsourcing has since long been known to affect business decisions of whether to outsource or not. This has lead to numerous research on topics such as: Understanding and Managing Outsourcing Risks, Methodologies to measure Outsourcing Risks, Risk Factors in Information Technology Outsourcing, Assessing the Risk of IT Outsourcing to name a few. But v...

2012
Paulo Picota Cano Miguel Vargas-Lombardo

Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats to the projects, thus, this projects must be designed and focused towards security in order to be able to stand against this threats. The following paper presents a summary of ...

Journal: :Proceedings of the Voronezh State University of Engineering Technologies 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید