نتایج جستجو برای: security concerns

تعداد نتایج: 280401  

2004
Björn Johansson David Byers

This report is written as part of the course TDDC03 Information Security at Linköping Institute of Technology. It aims to give an introduction to RFID, point out the current and future uses of the technology and to evaluate and discuss the technology from a perspective of information security and privacy with focus on new arising concerns.

2011

A thin client, also dubbed a lean or slim client, is a computer or an application that depends heavily on some other computer (its server) to fulfil its traditional computational roles. Thin client usage results in lower administrative costs and greater security. Since all processing occurs on a server and is centrally managed, the local environment is stateless and the hardware has fewer point...

2006
Monis Akhlaq M Noman Jafri Muzammil A Khan Baber Aslam

The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure...

Journal: :Computers & Security 2009
Azzam Mourad Andrei Soeanu Marc-André Laverdière Mourad Debbabi

In this paper, we present new pointcuts and primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. The two proposed pointcuts allow to identify particular join points in a program’s control-flow graph (CFG). The first one is the GAFlow, Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of...

2007
Azzam Mourad Marc-André Laverdière Mourad Debbabi

In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. These primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of par...

2017
Eric Zeng Shrirang Mare Franziska Roesner

The Internet of Things is becoming increasingly widespread in home environments. Consumers are transforming their homes into smart homes, with internet-connected sensors, lights, appliances, and locks, controlled by voice or other user-defined automations. Security experts have identified concerns with IoT and smart homes, including privacy risks as well as vulnerable and unreliable devices. Th...

2015
VARUN SHUKLA

Cloud computing is a method to enhance the capacity dynamically without investing in new infrastructure, training new personnel, or licensing new software. It can be viewed as a cost effective solution to various security threats. It extends the existing capabilities of Electronics and Communication world and its ongoing capabilities. In the last few years, cloud computing has grown from being ...

2010
Joo Soon Lim Atif Ahmad Shanton Chang Sean B. Maynard

The behaviour of employees has been identified as a key factor in the protection of organizational information. As such, many researchers have called for information security culture (ISC) to be embedded into organizations to positively influence employee behaviour towards protecting organizational information. Despite claims that ISC may influence employee behaviours to protect organizational ...

2007
Marc-André Laverdière Azzam Mourad Andrei Soeanu Mourad Debbabi

In this paper, we present two new control flow based pointcuts to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. They allow to identify particular join points in a program’s control flow graph (CFG). The first proposed primitive is the GAFlow, the closest guaranteed ancestor, which returns the closest ancestor join point to the pointcu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید