Showing 1 - 7 of 7
The informatics security concept is defined. For informatics applications which have a classical structure, the …-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when …
Persistent link: https://www.econbiz.de/10009416380
Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are...
Persistent link: https://www.econbiz.de/10009275910
In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very … involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here …'s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into …
Persistent link: https://www.econbiz.de/10010681049
systems through information security is described. Risks arise from system complexity, thus evaluation and comparison of …
Persistent link: https://www.econbiz.de/10010592516
The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The … security requirements of distributed informatics applications are determined. Aspects regarding design, development and … implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs …
Persistent link: https://www.econbiz.de/10008763605
analyzed. Ways of optimizing applications are described. Security requirements are enumerated and described. The … particularities of the security requirements for the citizen oriented applications are analyzed. Measures for ensuring the security of …
Persistent link: https://www.econbiz.de/10008763672
security risks, as well as methods of enhancing security, are detailed by DIA architectural features. The analysis includes … model based on a qualitative assessment of DIA security features, obtained through an inquiry in the common means of …
Persistent link: https://www.econbiz.de/10011132266