Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
secure computing --- precise computing --- intelligent computing --- software --- algorithms --- applications
Choose an application
Airline passenger security screening --- Government policy --- Evaluation. --- Secure Flight Program (U.S.) --- United States.
Choose an application
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these incidents are the result of improper use of existing control mechanisms. For example, improper access control specifications for key system files could open the entire system to unauthorized access. Moreover, many computer systems are delivered with default settings that, if left unchanged, leave the system exposed. This document discusses automated tools for testing computer system vulnerability. By analyzing factors affecting the security of a computer system, a system manager can identify common vulnerabilities stemming from administrative errors. Using automated tools, this process may examine the content and protections of hundreds of files on a multi-user system and identify subtle vulnerabilities. By acting on this information, system administrators can significantly reduce their systems' security exposure. This document examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Finally, the document offers general recommendations about the selection and distribution of such tools.
Change detection --- Computer security --- Configuration review --- Identification of vulnerabilities --- Secure audit --- Trojan horse detection --- Vulnerability testing
Choose an application
Border security --- Borderlands --- Government policy --- International cooperation. --- Security measures. --- Free and Secure Trade Program (U.S.) --- U.S. Customs and Border Protection --- Evaluation. --- Management --- Auditing.
Choose an application
Choose an application
Borderlands --- Imports --- National security --- Security measures --- Free and Secure Trade Program (U.S.) --- U.S. Customs and Border Protection --- Rules and practice --- Evaluation.
Choose an application
Choose an application
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
Data protection. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security --- Secure Date Management --- Privacy Protection --- Big Data Security --- Information Security --- Cyber Security --- Open Access --- Computer security
Choose an application
cryptanalysis --- secret-key cryptography --- cryptographic protocols --- secure smart system/device --- digital rights management --- quantum safe cryptography --- Data encryption (Computer science) --- Cryptography --- Cryptography. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer Science --- Engineering sciences. Technology
Choose an application
Biometric identification --- Identification biométrique --- Periodicals --- Périodiques --- EJINGEN EPUB-ALPHA-I EPUB-PER-FT IET-E --- biometrics recognition --- biometric applications --- secure biometric storage --- ethical issues in biometrics --- machine learning --- artificial intelligence --- Biometry --- Biometry. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Statistical methods
Listing 1 - 10 of 11 | << page >> |
Sort by
|