نتایج جستجو برای: security concerns
تعداد نتایج: 280401 فیلتر نتایج به سال:
This paper shows how aspects can be successfully employed in the support of system evolution. The context is a case study on migrating a legacy client-server application to overcome the security problems associated with ‘message tampering’ attacks. The focus is on authorization issues in which aspects are used to add a security mechanism based on digital signatures. The approach provides for fu...
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014...
Security is clearly a very important factor governing the size of the e-commerce market. E-commerce security concerns include payment confidentiality, payment integrity, and payment authorisation for Internet transactions. Currently, many potential e-commerce participants are reluctant to participate in Internet e-commerce because of these concerns, not least because many users perceive Interne...
The purpose of this paper is to present a survey of XML-based security standards that can be used for handling security requirements of distributed computing systems like Grid and Cloud. Distributed systems are expanding and their growth is apparent from the advancements in the field of distributed computing technologies like Grid, Peer-to-peer, Cloud, Pervasive Systems etc. As a result of this...
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology. Should provable security be restricted to the standard computational model or can it rely on the so-called ran...
Leap protocol offers many security benefits to WSNs. However, with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper, intensive research was undertaken on LEAP protocols, finding out its security drawbacks and limitations. One of the biggest...
Environmental and sustainable development advocates have a major blind spot in linking environmentalism to global security (resource protection) concerns. Though peace movements and environmental movements have begun to note the linkages between war and resource policies on the environment, and while antiglobalization (and some globalization) coalitions have sought multilateral frameworks that ...
The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have traditionally been understood within a standard Geo-political framing of security. This relates to unrealistic direct application in inter-State ...
In-lined Reference Monitors (IRMs) cure binary software of security violations by instrumenting them with runtime security checks. Although over a decade of research has firmly established the power and versatility of the in-lining approach to security, its widespread adoption by industry remains impeded by concerns that in-lining may corrupt or otherwise harm intended, safe behaviors of the so...
In-lined Reference Monitors (IRMs) cure binary software of security violations by instrumenting them with runtime security checks. Although over a decade of research has firmly established the power and versatility of the in-lining approach to security, its widespread adoption by industry remains impeded by concerns that in-lining may corrupt or otherwise harm intended, safe behaviors of the so...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید