نتایج جستجو برای: security concerns

تعداد نتایج: 280401  

2012
C.Kishor Kumar Reddy P. R Anisha K.Srinivasulu Reddy S.Surender Reddy

Cloud computing security (sometimes referred to simply as "cloud security") is an evolving subdomain of Computer security, Network security and, more broadly, Information security It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security softwar...

2013
David C. Wyld Arijit Ukil Ajanta De Sarkar Debasish Jana

Cloud computing is a computing environment consisting of different facilitating components like hardware, software, firmware, networking, and services. Internet or a private network provides the required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand, customized resource availability and performance management” are overpowered by the associated security r...

Journal: :Computer Communications 2008
Bo Sun Yang Xiao Chung-Chih Li Hsiao-Hwa Chen T. Andrew Yang

Recentadvances inwirelessnetworksandembedded systemshavecreatedanewclass ofpervasive systems such as Wireless Sensor Networks (WSNs) and Radio Frequency IDentification (RFID) systems. WSNs and RFID systems provide promising solutions for a wide variety of applications, particularly in pervasive computing.However, security andprivacy concernshave raised serious challenges on these systems. These...

2009
Marianne STONE

" Security is taken to be about the pursuit of freedom from threat and the ability of states and societies to maintain their independent identity and their functional integrity against forces of change, which they see as hostile. The bottom line of security is survival, but it also reasonably includes a subtstantial range of concerns about the conditions of existence. Quite where this range of ...

2007
Raj GURURAJAN

In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organisations appear to have understood the necessity for computer security, especially data security. Currently, in most organisations, security officers focus on IT securi...

Journal: :PoPETs 2016
Susan E. McGregor Franziska Roesner Kelly Caine

A free and open press is a critical piece of the civil-society infrastructure that supports both established and emerging democracies. However, as the professional activities of reporting and publishing are increasingly conducted by digital means, computer security and privacy risks threaten free and independent journalism around the globe. Through interviews with 15 practicing journalists and ...

2017
Eric Zeng Shrirang Mare Franziska Roesner Paul G. Allen

The Internet of Things is becoming increasingly widespread in home environments. Consumers are transforming their homes into smart homes, with internet-connected sensors, lights, appliances, and locks, controlled by voice or other user-defined automations. Security experts have identified concerns with IoT and smart homes, including privacy risks as well as vulnerable and unreliable devices. Th...

2017

Information security is the biggest challenge for network and ecurity administrators. The security of a given network highly depends o the software used and the administrative practices followed for operating systems, perimeter security, antivirus protection, intrusion detection, software development, systems and network monitoring, corporate mail, office productivity and so on. The rapid growt...

2013
Abhishek kumar Shubham Kumar Gupta

Cloud computing is the emerging technology that is used worldwide for storage as well as distributed data processing. In the cloud technology, client’s data is stored on the Cloud service provider’s domain. The concept of this new technology i.e. cloud computing is adopted by many clients, but is receiving criticism from many people, who observe that; in this cloud technology, client loses cont...

1998
Harrison Hong Jeffrey D. Kubik Amit Solomon

Several theories of reputation and herd behavior (e.g., Scharfstein and Stein (1990), and Zwiebel (1995)) suggest that herding among agents should vary with career concerns. Our goal is to document whether such a link exists in the labor market for security analysts. We find that inexperienced analysts are more likely to be terminated for inaccurate earnings forecasts than are their more experi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید