The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article discusses the assessment of the impact of the modern risk-based standards for ensuring the safety and security of Complex Industrial Facilities (CIF) of various industries. The focus pointed on the implementation the management systems based on PDCA cycle of safety process for CIF of fuel and energy complexes, including IT-Security. Furthermore, it is shown that the relevant applicability...
The new undergraduate colleges is the useful supplement of current higher education in China, and is the cornerstone for promoting EFA(Education For All). However, the teaching quality of these colleges has affected to a certain extent due to the incensement of the number of students, the decline of the quality of students, and the shortage of teachers. The PDCA method is a mature ring management...
The construction project of coal mine is characterized by onetime, high cost, long duration, difficult construction, technical complexity and multitudinous project participants, whose risk events occur frequently in its construction. Therefore, the risk monitoring of construction project of coal mine is of theoretical significance and practical value. The risk control problems of coal mine construction...
The emergence and advancement in Information and Communication Technology (ICT), initiated a promising revolution to healthcare. Healthcare Organizations are willing to coordinate and collaborate regarding patient information for better and in time services because health is a critical issue and require urgent focus. In this paper, a case study in Sweden is conducted including interviews and survey...
The survey from local enterprises shows that relationship conflict within organization has negative impact on organizational performance, but the effect from task conflict is not significant. The variables of psychological conditions such as psychological meaningfulness, psychological safety and psychological availability not only can directly affect individual's job involvement and organizational...
The e-business-based alliance is an advanced organization form and receives much concern at home and abroad. The issue on alliance e-business security threatens alliance normal operation, so the research on the evaluation of alliance e-business security is important. According to the connotation and research contents of alliance e-business security, the study designs the evaluation method. Applying...
To provide a systematic means of identifying and assessing information security risks, organizations typically adopt asset-driven (or asset-oriented) risk assessment schemes. These schemes require organizations to identify their information assets, find out potential incidents to those assets, and assess expected losses associated with those incidents. While asset value is important in determining...
Human resources are the core resources of the innovative organization. The effective human resource management is important content in innovative organization. According to the characteristics of the innovative organizationpsilas human resources, this article analyzes the common problems such as the structure of the innovative organization's talents is unreasonable; the introduction of the innovative...
With the increases in workflow security requirements, some complex requirements have to be expressed by authorization constraints. When more and more authorization constraints must be treated in workflow task assignment, the exception possibilities of workflow task assignment will rise definitely. In this paper, the concept of security risk coefficient was introduced and an exception handling method...
The resources choice question has the choice scope broadly and the entity strange degree higher question in the grid environment. Efficient resource sharing and utilization cannot be achieved without the guarantee of a higher degree of trust relationship. In this paper, reputation mechanism is introduced to resource selection in Grid, which aims at leverage the guarantee of trustworthiness and reliability...
Phishing, a criminal act of collecting personal, bank and credit card information by sending out forged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are constantly on the rise. The impact of phishing is quite drastic since it involves the threat of identity theft and financial losses....
Despite grids' popularity, virtual organizations (VOs) have yet to become a commodity technology in modern computing environments due to the complexity of managing them and difficulty of assuring user and VO isolation. Here, the authors describe the VO management approach taken by XtreemOS, a new grid operating system with native support for VOs that supports a wide range of computing resources, from...
Grid manages resources and services distributed across multiple control domains. Grid computing provides people the way to share large mount of distributed resources and services that belong to different local domain. It also makes security problems more complicate, such as in the grid group communication. In this paper, we analyze security requirements of grid environment, especially for the secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.