نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

2013
Anton Biasizzo Franc Novak Jozef Stefan

In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;

2015
A Michaela Vašková

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the prot...

2008
Zoran S. Bojkovic Bojan M. Bakmaz Miodrag R. Bakmaz

This work deals with some security issues over wireless sensor networks (WSNs). A survey of recent trends in general security requirements, typical security treats, intrusion detection system, key distribution schemes and target localization is presented. In order to facilitate applications that require packet delivery from one or more senders to multiple receivers, provisioning security in gro...

Journal: :the international journal of humanities 2008
elham aminzadeh

the protection of fundamental human rights at the time of war or peace is an obligation that should be observed at anytime by the states and international organizations. after the second world war, the non-peaceful situations such as occupation and economic sanctions have occurred numerously, which in some cases lasted for more than a decade. unfortunately, the laws governing these situations a...

2010
Reijo M. Savola Habtamu Abie

Systematically developed security metrics make it possible to gather sufficient and credible security evidence for runtime adaptive security management and off-line security engineering and management. This study introduces and analyzes security metrics and parameter dependencies for one particular distributed messaging system. The focus is on the effectiveness and correctness of security-enfor...

2010
Matt Bishop

Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of our lives, and the interconnections with more traditional academic disciplines such as analysis of algorithms, operating systems, and network protocols have convinc...

2014
Salih Ergün Abdülkadir Öz

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-orient...

Journal: :CoRR 2014
Florian Kammüller

In this paper, we provide a formal framework for the security of distributed active objects. Active objects communicate asynchronously implementing method calls via futures. We base the formal framework on a security model that uses a semi-lattice to enable multi-lateral security crucial for distributed architectures. We further provide a security type system for the programming model ASPfun of...

2014
Ismeet Kaur Ajay Mittal Manvjeet Kaur

Security of a biometric system is of paramount importance considering increased commercial use for allowing access to sensitive areas. In this context protection of stored biometric templates is of particular interest as these templates are irrevocable once leaked. Fuzzy vault has emerged as a novel cryptographic construct for the protection of biometric templates. But like every other techniqu...

2016
Brandon Mauer William Stackpole Daryl Johnson

The growth of the security industry is sparking a significant interest in well-rounded security professionals. Regional and national competitions in the academic community have been developed to help identify qualified candidates to support this industry. A course has been built to allow students to improve their skills in this area. This paper describes the process used to administer events in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید