Narrow your search
Listing 1 - 10 of 67 << page
of 7
>>
Sort by

Periodical
High-Confidence Computing
ISSN: 26672952 Publisher: Netherlands Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

VPNs: a beginner's guide
Author:
ISBN: 0072191813 Year: 2002 Publisher: New York McGraw-Hill

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Implementation and coordination of TSA's Secure Flight Program (redacted).
Author:
Year: 2012 Publisher: [Washington, D.C.] : Department of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Automated tools for testing computer system vulnerability
Authors: ---
Year: 1992 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these incidents are the result of improper use of existing control mechanisms. For example, improper access control specifications for key system files could open the entire system to unauthorized access. Moreover, many computer systems are delivered with default settings that, if left unchanged, leave the system exposed. This document discusses automated tools for testing computer system vulnerability. By analyzing factors affecting the security of a computer system, a system manager can identify common vulnerabilities stemming from administrative errors. Using automated tools, this process may examine the content and protections of hundreds of files on a multi-user system and identify subtle vulnerabilities. By acting on this information, system administrators can significantly reduce their systems' security exposure. This document examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Finally, the document offers general recommendations about the selection and distribution of such tools.


Dissertation
Development of mobile services to manage electronic health records
Authors: --- --- --- ---
Year: 2016 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Andaman7 is a mobile application for managing health records, developed by A7 Software company, based in Boncelles. This collaborative app has been designed to allow users to display, edit and exchange medical data, and by these means,to improve the communication between patients and doctors.

This master’s thesis has been conducted as part of the Andaman7 project. The goal consisted in developing mobile services for Andaman7, focusing on the Android version, and more generally, providing new features and solutions to the application.

The goal of the work was reached, as many solutions have been provided. Indeed, different tasks were performed for building or improving the GUI of the Android app: the presentation menu was modified in order to be integrated in a navigation drawer, the handmade toolbar was replaced by an Android built-in Toolbar, the screen rotations and the restoration of the application state were taken in charge, and a splash screen was added. Moreover, the GUI of the rules defining which parts of the patients’ records are shared with other users was re-designed, the languages and translations of the application were integrated. A notification system, based on Google Cloud Messaging, was also implemented. The confidentiality, integrity and origin of the medical data exchanged through the app server with other users was ensured, by integrating some cryptography mechanisms in the app. Finally, an analysis of two possible ways to perform secure backups of the users’ electronic health records was realized.

The present paper reports the choices and implementation details that have been made throughout the thesis, but also presents some alternatives and perspectives for enhancing the provided features in the future.


Digital
A comparative estimate of the effects which a continuance and a removal of the restriction upon cash payments are respectively calculated to produce : with strictures on Mr. Ricardo's proposal for obtaining a secure and economical currency
Authors: ---
Year: 1819 Publisher: London Printed for R. Hunter


Book
Free and secure trade program- continued driver eligibility
Author:
Year: 2012 Publisher: Washington, DC : Department of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A review of the Secure Electronic Network for Travelers Rapid Inspection program
Authors: ---
Year: 2004 Publisher: Washington, DC : Department of Homeland Security, Office of Inspector General, Office of Inspections, Evaluations, & Special Reviews,


Book
Improvements needed in the process to certify carriers for the Free and Secure Trade Program
Author:
Year: 2011 Publisher: Washington, DC : U.S. Dept. of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
An Act to Provide for the Application of Certain Provisions of the Secure Rural Schools and Community Self-Determination Act of 2000 for Fiscal Year 2021.
Author:
Year: 2022 Publisher: [Washington, D.C.] : [U.S. Government Publishing Office],

Listing 1 - 10 of 67 << page
of 7
>>
Sort by