نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2011
Marko Wolf Timo Gendrullis

Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for manipulations or misuse. Thus, especially safety...

2009
André Weimerskirch Kai Schramm Lars Wolleschensky Thomas Wollinger

It is foreseen that vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication systems will be deployed in the next decade. Data security is an enabler for V2V and V2I communication, because the authenticity, integrity and confidentiality of exchanged network traffic must be guaranteed, especially since these messages will certainly be used for safety applications. Furthermore, ...

2017
Matteo Smerlak Bapu Vaitla

Resilience, the ability to recover from adverse events, is of fundamental importance to food security. This is especially true in poor countries, where basic needs are frequently threatened by economic, environmental and health shocks. An empirically sound formalization of the concept of food security resilience, however, is lacking. Here, we introduce a general non-equilibrium framework for qu...

Journal: :Journal of personality and social psychology 2013
Chin Ming Hui Daniel C Molden Eli J Finkel

Close relationships fulfill many important needs. However, not all of these needs are equally salient under all circumstances. This article investigated how the broad motivational context in which people evaluate relationships affects the salience of particular needs, thereby altering how the fulfillment of these needs predicts relationship well-being. Across 5 studies, participants reported ho...

1998
Scott A. Hissam David Carney Daniel Plakosh

Government policies on the acquisition of software-intensive systems have recently undergone a significant shift in emphasis toward use of existing commercial products. Some Requests for Proposals (RFPs) now include a mandate concerning the amount of COTS (commercial off-the-shelf) products that must be included. This interest in COTS products is premised on a number of factors, not least of wh...

2006
Michael Jenkins Syed Masud Mahmud

The need for active safety, highway guidance, telematics, traffic management, cooperative driving, driver convenience and automatic toll payment will require future intelligent vehicles to communicate with other vehicles as well as with the road-side infrastructure. However, inter-vehicle and vehicle to roadside infrastructure communications will impose some security threats against vehicles’ s...

Journal: :Computer methods and programs in biomedicine 2006
Che-Ming Yang Herng-Ching Lin Polun Chang Wen-Shan Jian

The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world incl...

Journal: :IJIIT 2006
H. Hamidi K. Mohammadi

The reliable execution of mobile agents is a very important design issue in building mobile agent systems and many fault-tolerant schemes have been proposed so far. Security is a major problem of mobile agent systems, especially when monetary transactions are concerned. Security for the partners involved is handled by encryption methods based on a public key authentication mechanism and by secr...

2005
S. A. Mlangeni E. Biermann

Information needs to be transmitted to and from the organisation, and thus may be vulnerable within certain stages along the communications line. If at any stage of the process, the information is compromised, it could have a negative impact on the entire organisation. Protective measures such as disaster recover plans, encryption / decryption, and information systems controls, can minimize or ...

Journal: :JIPS 2010
Seong-Hee Bae Jaejoon Kim

This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید