The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Enterprises must provide secure services for their customers in e-commerce. There are some threats that should consider in this area. Providing secure services is so extensive and difficult, using the appropriate models can facilitate implementing. Here we try to introduce a two level model which outlines managerial and technical requirements of this issue, that includes security standards and protocols...
In a complex and dynamic environment such as hospitals, location detection systems can be employed to improve resource management and quality of services. Many technologies (radio frequency, ultrasound) have been deployed with advantages and drawbacks regarding the specific demanded application. They are compared together from several aspects such as coverage area, accuracy and health concern in this...
Considering convergence of vast and different technologies in new generation networks, the required quality of service is the key success factor. The site implementation according to special benchmarking (TPC-W), to achieve the acceptable service performance may be offered in a cost effective manner, is very complicated. In this paper a mathematical method will be introduced to help providers to make...
This article represent a new quantitative approach for assessing the overall information security risks in the real business environment. The new approach is based on Microsoft and Callio Secura approach which are common and practical approaches in the world. The advantage of this approach is that the organization can determine its business risk and the return on security investment.
There are so many models for security risk assessment, but most of them are non practical. An effective security risk management process enables enterprises to operate in the most cost efficient manner with a known and acceptable level of business risk. Callio Secura 17799 is a simple, but effective tool for implementing an information security management system, based on the ISO/IEC 27001:2005 standard...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.