Showing 1 - 10 of 155
system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity …The preventive control is one of the best well advance control for recent complex IS Security Application to protect … security put forward to the management focus on IT infrastructure. This work contributes to the development of an optimization …
Persistent link: https://www.econbiz.de/10012043937
data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was … Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than … became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many …
Persistent link: https://www.econbiz.de/10012045717
security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical …This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the … cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and …
Persistent link: https://www.econbiz.de/10009438385
Persistent link: https://www.econbiz.de/10012416431
support privacy, integrity and security of online transactions. E-commerce assurance services available at the end of year …Growth of online auctions and other forms of e-commerce has been hampered by concerns about the privacy, integrity, and … security of online transactions. To earn the trust of their participants, new e-commerce organizations, like traditional …
Persistent link: https://www.econbiz.de/10005586956
on wireless sensor networks is to find an optimal schema that ensuring energy efficiency together with the security. In …-frequency-time spread spectrum secures data communication against jamming and falsification to ensure data integrity and increases …
Persistent link: https://www.econbiz.de/10012043067
consideration. Security of data and its integrity verification in the cloud are major issues that act as a barrier to the adoption … availability. Along with these benefits, cloud computing comes with certain security issues that a user has to take into … integrity at the cloud storage site. This article further extends prior work. In this article, the modified one-way hash …
Persistent link: https://www.econbiz.de/10012044943
The purpose of this article is to evaluate the impact of ecosystems on Information Security in Smart Cities using Dubai … as a case study. Innovative interconnected systems can affect the integrity of the information used by residents and … support the theory and perceptions held by management practitioners and information security specialists. …
Persistent link: https://www.econbiz.de/10012045770
committhemselves to professional codes of conduct, which entails competency,integrity, objectivity and confidentiality, the 1st article …
Persistent link: https://www.econbiz.de/10009456141
The six factors considered for achieving success in leadership are clarity, role modeling, achievability, commitment, transparency and openness. The article analyzes the factors that generate a failure of leadership, even for the so-called widely renewed good leaders, precisely the behavior...
Persistent link: https://www.econbiz.de/10014291527