نتایج جستجو برای: security concerns

تعداد نتایج: 280401  

2004
Robin C. Laney Janet van der Linden Pete Thomas

This paper shows how aspects can be successfully employed in the support of system evolution. The context is a case study on migrating a legacy client-server application to overcome the security problems associated with ‘message tampering’ attacks. The focus is on authorization issues in which aspects are used to add a security mechanism based on digital signatures. The approach provides for fu...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2015
Joshua E. Richardson Jessica S. Ancker

Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014...

2002
Pita Jarupunphol Chris J. Mitchell

Security is clearly a very important factor governing the size of the e-commerce market. E-commerce security concerns include payment confidentiality, payment integrity, and payment authorisation for Internet transactions. Currently, many potential e-commerce participants are reluctant to participate in Internet e-commerce because of these concerns, not least because many users perceive Interne...

2013
Sarbjeet Singh Jagpreet Sidhu

The purpose of this paper is to present a survey of XML-based security standards that can be used for handling security requirements of distributed computing systems like Grid and Cloud. Distributed systems are expanding and their growth is apparent from the advancements in the field of distributed computing technologies like Grid, Peer-to-peer, Cloud, Pervasive Systems etc. As a result of this...

2003
Jacques Stern

Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology. Should provable security be restricted to the standard computational model or can it rely on the so-called ran...

2015
R. K. Krishna

Leap protocol offers many security benefits to WSNs. However, with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper, intensive research was undertaken on LEAP protocols, finding out its security drawbacks and limitations. One of the biggest...

2011
David Lempert

Environmental and sustainable development advocates have a major blind spot in linking environmentalism to global security (resource protection) concerns. Though peace movements and environmental movements have begun to note the linkages between war and resource policies on the environment, and while antiglobalization (and some globalization) coalitions have sought multilateral frameworks that ...

2014
Paul Nightingale Rose Cairns

The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have traditionally been understood within a standard Geo-political framing of security. This relates to unrealistic direct application in inter-State ...

2013
Meera Sridhar Richard Wartell Kevin W. Hamlen

In-lined Reference Monitors (IRMs) cure binary software of security violations by instrumenting them with runtime security checks. Although over a decade of research has firmly established the power and versatility of the in-lining approach to security, its widespread adoption by industry remains impeded by concerns that in-lining may corrupt or otherwise harm intended, safe behaviors of the so...

Journal: :Sci. Comput. Program. 2014
Meera Sridhar Richard Wartell Kevin W. Hamlen

In-lined Reference Monitors (IRMs) cure binary software of security violations by instrumenting them with runtime security checks. Although over a decade of research has firmly established the power and versatility of the in-lining approach to security, its widespread adoption by industry remains impeded by concerns that in-lining may corrupt or otherwise harm intended, safe behaviors of the so...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید