Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Periodical
High-Confidence Computing
ISSN: 26672952 Publisher: Netherlands Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Implementation and coordination of TSA's Secure Flight Program (redacted).
Author:
Year: 2012 Publisher: [Washington, D.C.] : Department of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Automated tools for testing computer system vulnerability
Authors: ---
Year: 1992 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these incidents are the result of improper use of existing control mechanisms. For example, improper access control specifications for key system files could open the entire system to unauthorized access. Moreover, many computer systems are delivered with default settings that, if left unchanged, leave the system exposed. This document discusses automated tools for testing computer system vulnerability. By analyzing factors affecting the security of a computer system, a system manager can identify common vulnerabilities stemming from administrative errors. Using automated tools, this process may examine the content and protections of hundreds of files on a multi-user system and identify subtle vulnerabilities. By acting on this information, system administrators can significantly reduce their systems' security exposure. This document examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Finally, the document offers general recommendations about the selection and distribution of such tools.


Book
Free and secure trade program- continued driver eligibility
Author:
Year: 2012 Publisher: Washington, DC : Department of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A review of the Secure Electronic Network for Travelers Rapid Inspection program
Authors: ---
Year: 2004 Publisher: Washington, DC : Department of Homeland Security, Office of Inspector General, Office of Inspections, Evaluations, & Special Reviews,


Book
Improvements needed in the process to certify carriers for the Free and Secure Trade Program
Author:
Year: 2011 Publisher: Washington, DC : U.S. Dept. of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
An Act to Provide for the Application of Certain Provisions of the Secure Rural Schools and Community Self-Determination Act of 2000 for Fiscal Year 2021.
Author:
Year: 2022 Publisher: [Washington, D.C.] : [U.S. Government Publishing Office],


Book
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields
Authors: --- ---
ISBN: 9811536546 9811536538 Year: 2020 Publisher: Singapore Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.


Periodical
IET biometrics.
Author:
ISSN: 20474938 20474946 Year: 2012 Publisher: Stevenage, UK : [Hoboken N.J.] : Institution of Engineering and Technology, John Wiley & Sons Inc. [on behalf of The Institution of Engineering and Technology]

Listing 1 - 10 of 11 << page
of 2
>>
Sort by