Listing 1 - 10 of 6116 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Biometric and security technologies are the key components for providing reliable solution against cyber terrorism or damage in order to improve the nation safety Biometric provides methods to identify the uniqueness of each individual identity Therefore with biometric solution, scientists are able to determine ways to accurately identify people based upon their physical and behavioral characteristics However, improvements in biometric equipment, interoperability and database accuracy are crucial for nation safety This is also applied for other security technology solutions ISBAST2014 provides researchers with an excellent platform for dissemination of latest research findings and the state of practice in the areas of biometric and security technologies This conference covers areas such as biometric, forensic, cloud computing, network security and cybersecurity However, the scope is not limited to the aforementioned areas ISBAST2014 enables participants to learn the latest tre.
Choose an application
The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on.
Choose an application
The requirements for a systems/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user's personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002™ standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.
Choose an application
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 6116 | << page >> |
Sort by
|