نتایج جستجو برای: security papers

تعداد نتایج: 265761  

Journal: :پژوهش های مهندسی صنایع در سیستم های تولید 0

0

2000
Steven J. Greenwald Simon N. Foley Kai Rannenberg

Session Abstract This panel will highlight a selection of some of the most interesting and provocative papers from the 2000 New Security Paradigms Workshop (NSPW), held 19-21 September in Ballycotton, County Cork, Ireland . For nine years, NSPW has provided a productive and highly interactive forum in which innovated new approaches (and radical older approaches) to informat...

Journal: :Computer Standards & Interfaces 2014
Carlos Blanco David G. Rosado Luís Enrique Sanchez Jan Jürjens

Information Systems Security is one of themost pressing challenges currently confronted by all kinds of organizations. Information systems undoubtedly play an important role in today's society and are increasingly at the heart of critical infrastructures. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to ...

Journal: :Proceedings of the Royal Society of Medicine 1974

Journal: :Science and engineering ethics 2014
Emilio Mordini

This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical consideration...

Journal: :IJISP 2007
Stephen J. H. Yang Blue C. W. Lan James S. F. Hsieh Jen-Yao Chung

Recent Articles: n Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation n Administering the Semantic Web: Confidentiality, Privacy, and Trust Management n Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication As information technology and the Internet become increasingly pervasive in our daily lives, there is an essential need for ...

2013
Harjinder Kaur Sarpreet Singh

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Data security is one of the biggest concerns in adopting Cloud computing. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Sinc...

2006
Joan Lu Umair Rahman Yau Jim Yip

There has been a sudden rise in the use of XML and the development of tools and specifications using XML such as web services. Contemporary solutions were found to be lacking facilities to secure XML based applications. This paper is a review of XML security specifications. A comprehensive literature review was conducted to assess and summarize the validity of current and contemporary tools and...

2015
S. B. Geetha Venkanagouda C Patil

Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communica...

2011
Mini Singh Ahuja Sumit Chabbra

Biometric technologies are used to analyse human characteristics for security purposes. The most common physical biometrics patterns analyzed for security purposes are the fingerprint, hand, eye, face and voice. The advantages of using biometrics to verify a person’s identity over using passwords or token have been broadly presented in many research papers. However recent research has revealed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید