Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper the development of a Standard Model and Architecture of Digital ID (MAEID) is shown to enable security mechanisms, which permit the identification and authentication to secure transactions in an educational environment. These ontologies based mechanisms (data structure), public key cryptography (encryption, digital certificates, digital signatures, etc‥) And biometrics, implemented properly...
the goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over recent years.
The immense improvement in information and communications technologies (ICT) has motivated service providers to offer services through electronic channels. Governments also realize the widespread, cost-effective and strategic roles that ICT plays in order to serve citizens and other businesses. With the development of a greater number and variety of e-services, citizens have higher expectations and...
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support...
Technological advances in electronic services have made it easier than ever before to access and share different kinds of data. In the healthcare sector, the exchange of patients' information between different actors (hospitals, laboratories, pharmacies …) improves diagnosis and treatment quality and reduces related costs. However, this exchange arise new security concerns and makes patient information...
Service Oriented Computing (SOC) has facilitated a paradigm shift in software provisioning models: software gets consumed as a "service" providing enormous benefits, however lack of security assurance of third-party services is hampering their wider adoption in business- and security-critical domains. Security certification typically provides the required assurance, however applying it as...
Based on the surveys for moral status of China's network marketing, to analyze the moral failure and the causes of network marketing to try to build moral system and evaluation model of network marketing in the harmonious society. And on this basis, establish normative measures for network marketing moral.
When we want to gain the weight of several influencing factors without sufficient data, we use the Analytic Hierarchy Process method. But sometimes this method may be a little inaccuracy, for the weights of the inner process are decided by manpower. This paper takes the background of food security to provide an improved Analytic Hierarchy Process method, which conduct the Analytic Hierarchy Process...
Problems of land ecological security caused by the unreasonable utilization of land resource have influenced the sustainable development of society and economy. This paper selected areas along the Changjiang River in Anhui Province as study area. It constructed an evaluation index system of land ecological security based on Pressure-State-Response model. Considering the illegibility and uncertainty...
In the research of Emergency Preparedness (EP), knowledge representation and storage of the EP is one of the most important tasks. However, most of the existing plans are ill-structured and lacked compatibility, which makes it difficult to manage. In this paper, we proposed a formal description of their features and contents, which conforms to Open XML standards, on the basis of the analysis of EPs...
As the most valuable resource, information has become a key factor in deciding the levels of national productivity and economic growth. But there are lots of risks in the implementation. Risk assessment is an effective approach to evaluate security state of information system. In this paper a model of information system risk assessment based on its characters of incompleteness and ambiguity is presented...
The Internet has grown out of its original scope and scale while its importance for the society has increased. This has raised considerable uncertainties and concerns about the future evolution. We apply Schoemakerpsilas scenario planning method to identify and analyze the key trends and uncertainties and to create four alternative evolution scenarios for the Internet. The scenarios reveal that the...
An integrative fuzzy set pair model, established by integrating fuzzy assessment and set pair analysis, was introduced to assess the land ecological security states. The approximate degree of land ecological security to the optimal standard set was calculated to describe the security level by combining multiple indices. The indices and weights were determined by Delphi and fuzzy AHP (Analytic Hierarchy...
If companies wish to safeguard their value chain, they should invest with the singular goal of securing revenues by taking adequate risk countermeasures. However, the investment in the risk countermeasure must be reflected in the adequate safeguarding of the value chain. In other words, the investment in the safeguarding, e.g., implementation of an ISMS based on ISO/IEC 27001:2005, must be comparable...
The cancer Biomedical Informatics Grid (caBIGtrade) was initiated by the US National Cancer Institute in 2004 to address the need for interoperable information systems to enable molecular medicine for oncology. With the successful completion of the pilot phase of caBIGtrade in 2007, the NCI is in the process of expanding the program into the broader biomedical research and care delivery arena. To...
The majority of the current product line practices in requirements engineering do not adequately address security requirements engineering despite the fact that security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. Therefore, our contribution is to present and to demonstrate the...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
In order to encapsulate data and to convey information more efficiently and more security, a draft frame based on active block ciphers for application layer of Internet which could transmit orange data into semantic security and semantic integrity was designed according to scalable purpose. To different network environment, there were different intelligent choices about block cipher algorithms to...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Requirements modeling has been recently introduced in the UML world with the form of a new profile called SysML. This paper explores the possibility to link concepts used to describe requirements with those of the enterprise language of RM-ODP. Some correspondence rules are proposed and illustrated on a case study.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.