Showing 1 - 10 of 2,536
security authentication process when accessing remote servers. The security of internet banking application has high level but …€ (Internet for breeders) and “AgromanuaÌlâ€. Two most popular domestic portals – „seznam.cz†and “DatoveÌ schraÌnkyâ …€ (Data boxes) were also included to compare the results of agricultural portals security. The aim of this paper is to point …
Persistent link: https://www.econbiz.de/10011142397
Users are often considered the weakest link in the security chain because of their natural propensity for choosing … user's personal security. However, we don't fully understand the impact on the organisation as a whole when such laxity is … contained in these policies impact on the security of the systems in an organisation. Sometimes a mandated tightening of policy …
Persistent link: https://www.econbiz.de/10010671706
will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed …. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC …
Persistent link: https://www.econbiz.de/10005154571
<Para ID="Par2">In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense...</para>
Persistent link: https://www.econbiz.de/10011001385
shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and …
Persistent link: https://www.econbiz.de/10009416786
utilises the security enhanced 64K microprocessor chip and biometric technology, ensuring a high level of accuracy, enabling …
Persistent link: https://www.econbiz.de/10010670142
, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this … security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the … inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea. …
Persistent link: https://www.econbiz.de/10009416598
Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions … Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A … web authentication technologies that are currently available to financial institutions and provides an interpretation of …
Persistent link: https://www.econbiz.de/10008539400
Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions … Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A … web authentication technologies that are currently available to financial institutions and provides an interpretation of …
Persistent link: https://www.econbiz.de/10005048881
solutions is now a reality. In this article we want topresent the main security issues related to the financial data stored in …
Persistent link: https://www.econbiz.de/10010838775