The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although computer users are aware of spyware, they typically do not take protective steps against it. A recent study looks into the reasons for this apathy and suggests boosting users' confidence in installing and operating antispyware solutions as an effective remedy.
Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The authors describe an automated fingerprint recognition system and identify key challenges and research opportunities in the field.
Iris recognition systems have made tremendous inroads over the past decade, but work remains to improve their accuracy in environments characterized by unfavorable lighting, large stand-off distances, and moving subjects.
Biometric systems encompass the development of capture devices to acquire biometric signals, software algorithms for effective identification, and databases that store biometric data for comparison.
Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies does not make sense. Quite possibly this relationship results from not applying rewards for security compliance. Also mentions that...
This article talks about how the study of how humans perceive faces can be used to help design practical systems for face recognition. Besides applications related to identification and verification-such as access control, law enforcement, ID and licensing, and surveillance-face recognition has also proven useful in applications such as human-computer interaction, virtual reality, database retrieval,...
Topics include efforts to accelerate computer bootups, a new data glove that records users' hand and finger motions to let them interact with various types of systems, a lithography technique for creating fast chips, and the world's smallest medical camera.
The cloud heralds a new era of computing where application services are provided through the Internet. Cloud computing can enhance the computing capability of mobile systems, but is it the ultimate solution for extending such systems' battery lifetimes?
This special issue brings together key software engineering researchers and practitioners who both influence their organizations and evaluate the emerging practice of developing these new systems.
Fears about hackers intruding into Wi-Fi networks and either stealing important information or planting malware have increased over the years. As a result, wireless intrusion-prevention systems are becoming increasingly important.
Traditionally, business intelligence provides companies with important, but not real-time or predictive, analysis. Moreover, only technical specialists have typically run BI tools and have done so just for the benefit of management. Pervasive BI remedies these limitations.
Topics include research into ways to provide security for RFID technology, plans to combine TV and social networking, lightweight batteries made of paper, and cybercrime flourishing despite the global economic downturn.
Commodity hardware enables a range of cost-effective ubiquitous computing research, but innovative custom hardware can drive compelling new user experiences. One of the dreams of ubiquitous computing is an ecology of heterogeneous computer systems, built into the environment around us and acting in concert to make our lives easier and more fun. Fundamental to this vision is a movement away from the...
Deterrence, civil defense, collective defense, and arms control were key national security doctrines in the 20th century, and they are being reevaluated now for application to cyberspace.
Implantable medical devices have become increasingly popular, and a growing number are equipped with wireless communications technology to increase their usefulness. However, this could make the devices susceptible to hackers.
In an interview conducted by Computer editorial board member Ann E.K. Sobel, Cigital CTO Gary McGraw discusses the state of software security and the BSIMM—a data-driven research project describing and measuring what successful organizations are doing to ensure software security.
Under the game-change metaphor, strategies developed to address hard problems will potentially lead to breakthroughs in many different interrelated cybersecurity areas. For software assurance, a game change should focus on improving resiliency and hardening new technologies that implement moving-target defenses and tailored trustworthy spaces.
As software dependence reaches critical levels, threats become more pervasive, and losses become more costly, higher education must place more value on the tenets of software assurance. Courses must focus not only on security but on providing justified confidence in the software or system throughout its life cycle.
The Department of Homeland Security National Cyber Security Division's Software Assurance Program promotes the collaborative development of reliable measurement instruments and standards, opportunities for the exchange and dissemination of knowledge, a skilled workforce, and a secure software supply chain.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.