نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Session Abstract This panel will highlight a selection of some of the most interesting and provocative papers from the 2000 New Security Paradigms Workshop (NSPW), held 19-21 September in Ballycotton, County Cork, Ireland . For nine years, NSPW has provided a productive and highly interactive forum in which innovated new approaches (and radical older approaches) to informat...
Information Systems Security is one of themost pressing challenges currently confronted by all kinds of organizations. Information systems undoubtedly play an important role in today's society and are increasingly at the heart of critical infrastructures. Although many companies have discovered how critical information is to the success of their business or operations, very few have managed to ...
This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical consideration...
Recent Articles: n Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation n Administering the Semantic Web: Confidentiality, Privacy, and Trust Management n Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication As information technology and the Internet become increasingly pervasive in our daily lives, there is an essential need for ...
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Data security is one of the biggest concerns in adopting Cloud computing. In Cloud environment, users remotely store their data and relieve themselves from the hassle of local storage and maintenance. However, in this process, they lose control over their data. Sinc...
There has been a sudden rise in the use of XML and the development of tools and specifications using XML such as web services. Contemporary solutions were found to be lacking facilities to secure XML based applications. This paper is a review of XML security specifications. A comprehensive literature review was conducted to assess and summarize the validity of current and contemporary tools and...
Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communica...
Biometric technologies are used to analyse human characteristics for security purposes. The most common physical biometrics patterns analyzed for security purposes are the fingerprint, hand, eye, face and voice. The advantages of using biometrics to verify a person’s identity over using passwords or token have been broadly presented in many research papers. However recent research has revealed ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید