نتایج جستجو برای: security concerns
تعداد نتایج: 280401 فیلتر نتایج به سال:
This report is written as part of the course TDDC03 Information Security at Linköping Institute of Technology. It aims to give an introduction to RFID, point out the current and future uses of the technology and to evaluate and discuss the technology from a perspective of information security and privacy with focus on new arising concerns.
A thin client, also dubbed a lean or slim client, is a computer or an application that depends heavily on some other computer (its server) to fulfil its traditional computational roles. Thin client usage results in lower administrative costs and greater security. Since all processing occurs on a server and is centrally managed, the local environment is stateless and the hardware has fewer point...
The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure...
In this paper, we present new pointcuts and primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. The two proposed pointcuts allow to identify particular join points in a program’s control-flow graph (CFG). The first one is the GAFlow, Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of...
In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. These primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of par...
The Internet of Things is becoming increasingly widespread in home environments. Consumers are transforming their homes into smart homes, with internet-connected sensors, lights, appliances, and locks, controlled by voice or other user-defined automations. Security experts have identified concerns with IoT and smart homes, including privacy risks as well as vulnerable and unreliable devices. Th...
Cloud computing is a method to enhance the capacity dynamically without investing in new infrastructure, training new personnel, or licensing new software. It can be viewed as a cost effective solution to various security threats. It extends the existing capabilities of Electronics and Communication world and its ongoing capabilities. In the last few years, cloud computing has grown from being ...
The behaviour of employees has been identified as a key factor in the protection of organizational information. As such, many researchers have called for information security culture (ISC) to be embedded into organizations to positively influence employee behaviour towards protecting organizational information. Despite claims that ISC may influence employee behaviours to protect organizational ...
In this paper, we present two new control flow based pointcuts to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. They allow to identify particular join points in a program’s control flow graph (CFG). The first proposed primitive is the GAFlow, the closest guaranteed ancestor, which returns the closest ancestor join point to the pointcu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید