نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2005
Wen Ding William Yurcik Xiaoxin Yin

Firms hesitate to outsource their network security to outside security providers (called Managed Security Service Providers or MSSPs) because an MSSP may shirk secretly to increase profits. In economics this secret shirking behavior is commonly referred to as the Moral Hazard problem. There is a counter argument that this moral hazard problem is not as significant for the Internet security outs...

1998
Reiner Sailer

nels in the future. Furthermore, teleservices process more Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommunication services which saves the huge investments into existing network infrastructure of the ISDN. This is done by adding trusted runtime environments that co...

2006
Michael Shin

This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the comp...

2003
Audun Jøsang Mary Anne Patton

Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authentication process to the user in a way that is meaningful and ensures security. We show examples where authentication requirements are not met, due to user behaviour and properties of existing user interfaces, and suggest...

2012
Rainer Schick Christoph Ruland

Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digi...

Journal: :CoRR 2014
Sanjay Majumder Sanjay Chakraborty Suman Das

Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique ...

Journal: :JNW 2008
Stefan Lindskog Zoltán Faigl Anna Brunstrom

Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices with varying resources tunable security services are needed. A tunable security service is a service that provides different security configurations that are selected, and possibly altered, at run-time. In this paper,...

Journal: :Knowledge Eng. Review 2011
Liang Xiao Srinandan Dasmahapatra Paul H. Lewis Bo Hu Andrew Peet Alex Gibb David Dupplaw Madalina Croitoru Francesc Estanyol Juan Martínez-Miranda Horacio González-Vélez Magí Lluch i Ariet

In this paper, we analyse the special security requirements for software support in healthcare and the HealthAgents system in particular. Our security solution consists of a link-anonymised data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrat...

Journal: :IJMIS 2011
Mandana Farzaneh Shahriar Mohammadi

News websites provide various kinds of information and have a great contribution in creating knowledge to community citizens. Providing security has a great impact on the usability of these websites and encourages users to trust and share their personal information to take advantages of various facilities on the news website. The main contribution of this paper is to examine if website features...

Journal: :Computer Science (AGH) 2012
Gabriele Pierantoni Brian A. Coghlan Eamonn Kenny

HELIO [8] is a project funded under the FP7 program for the discovery and analysis of data for heliophysics. During its development, standards and common frameworks were adopted in three main areas of the project: query services, processing services, and the security infrastructure. After a first, proprietary implementation of the security service, it was suggested moving it to a standard secur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید