Advanced search    

Search: Systems and Data Security

544,285 papers found. Showing first 1,000 results.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Afghanistan and International Security

, it has had extraordinary effects on in ternational relations. The central question that is explored here is: what are the implications ofwars in Afghanistan for international security, not only in the ... Afghanistan and their influence on international security. • What have been the effects of previous wars in Afghanistan, particularly in the nineteenth centu.ry and in the Soviet period 1979-89, on regional

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure

achieve, as technology is changing at rapid speed and our systems turn into ever more complex. The explosion of multimedia big data has created unprecedented opportunities and fundamental security ... this problem, including: Security and privacy of multimedia big data in banking systems Security and privacy of multimedia big data in telecommunication systems Security and privacy of multimedia big

Governments want your smart devices to have stupid security flaws

Airline systems, like all networks, are vulnerable to hacking.Credit: Michael H/GettyClick Here to Kill Everybody: Security and Survival in a Hyper-connected World Bruce Schneier W. W. Norton (2018 ... )Hardly a day now passes without reports of a massive breach of computer security and the theft or compromise of confidential data. That digital nightmare is about to get much worse, asserts security

Intelligent transportation systems in big data

: 11 September 2018 44 Downloads 1 Introduction Big data provides unprecedented opportunities for the development of intelligent transportation systems. Taking full advantage of big data ... from academe and industry can present the advanced methodologies to cope with intelligent transportation systems in Big Data problems. At the same time, they can also elaborate on the state-of-the-art

Security and privacy aware data aggregation on cloud computing

The use of cloud computing has become common due to advantages such as low cost and sizing of computing resources according to demand. However, it also raises security and privacy concerns, because ... Industry Forum [ 2 ] for the United Kingdom, the two main inhibitors for cloud computing adoption are concerns about data security and privacy, mentioned by 70% and 61% of the respondents, respectively. In

Maritime Domain Awareness: The Key to Maritime Security

different airlines existed on the morning of September 11 , 2001. Had this data been available and shared widely in an aviation safety and security communi ty that understood the potential threat, the world ... m akes two importan t points. First, it dramatically rem ind s us of the vulnerability of these crucial parts of our transporta tion and economic systems. Our ports are essen tial trans-shipment nodes

Big healthcare data: preserving security and privacy

delivery and improve the quality of life in general. However, deciding on the allowable uses of data while preserving security and patient’s right to privacy is a difficult task. Big data, no matter how ... and Pig [ 40 ]. Big data network security systems should be find abnormalities quickly and identify correct alerts from heterogeneous data. Therefore, a big data security event monitoring system

Security in the Strait of Malacca and the Regional Maritime Security Initiative: Responses to the US Personnal

commander of the US Pacific Comm and, is one of the American maritime security programs and initiatives designed to p romote re­ gional cooperation and improve mari time security in the East Asia and Pacific ... of maritime terrorism, prolifera­ tion of weapons of mass destruction (WMD ) and the security of the maritime transport sector in general. As a result of this changed strategic environment in the

Big Data Management for Healthcare Systems: Architecture, Requirements, and Implementation

processing approaches and platforms in existing data management architectures for healthcare systems, these architectures face difficulties in preventing emergency cases. The main contribution of this paper is ... healthcare systems. Raghupathi et al. exposed in [14] the architectural framework and challenges of big data healthcare analytics. In another study (see [15]), the importance of security and privacy issues is

Homeostatic approach to assessing digital manufacturing security

This study suggests a new digital manufacturing security paradigm based on the bio-inspired homeostasis concept to provide structural and functional cyber resilience of digital manufacturing to ... obtaining data on the operations being carried out. A digital manufacturing security paradigm should be based on new security principles which have to be invariant to attack mechanisms because the components

Analysis of security in cyber-physical systems

. Pang et al. [13] considered the security of networked control systems and proposed a secure architecture. The basic idea is that data encryption standard (DES) algorithm and message digest (MD5 ... beware of the grave consequences of a cyber-attack on a CPS. Since many national critical infrastructures are applications of CPS, ensuring security and safety of such systems is of great importance. In

Quantum Computational Supremacy: Security and Vulnerability in a New Paradigm

reaching implications for cybersecurity as it poses an unprecedented threat to the public key encryption that forms an important component of the security of all digital communications. This paper outlines ... . Even without the use of quantum technologies, systems are under constant attack. Absolute security of data is impossible to achieve (and sometimes not desired7) and the cost increases greatly with the

Ethnographies of Security: Pushing Security Studies Beyond the Bounds of International Relations

attuned to how subjects of surveillance navigate, and in some cases resist, the military, border security, and carceral systems. In her article written from spaces contested by military forces and other ... training researchers to care for their own safety while conducting research, and this is true across ethnographic research. Collecting data on (in)security should not be prioritized over researchers

Intelligent data attacks against power systems using incomplete network information: a review

With the integration of information technologies, power system operations are increasingly threatened by cyber-attacks. It has even been revealed that an attacker can inject false data into real-time ... topics for facilitating the detection and prevention of such false data attacks. Cyber security; False data injection attack; Incomplete network information; Power system state estimation 1 False data

Requirements for Interoperability in Healthcare Information Systems

-Enterprise User Assertion integration profile (XUA) specifies how the Security Assertion Markup Language (SAML) can be used to provide single sign-on. Special data fields are also provided as part of the Cross ... constraints with respect to specific data objects. Although the technology permits the implementation and testing of security mechanisms, specific security design is required. This should encompass security

Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes

The Sponge function is known to achieve \(2^{c/2}\) security, where c is its capacity. This bound was carried over to its keyed variants, such as SpongeWrap, to achieve a \(\min \{2^{c/2},2^\kappa ... associated-data , in V. Atluri, (ed.) Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002 , Washington, DC, USA, November 18 - 22 , 2002 . (ACM, 2002 ), pp. 98 - 107 [78] P

Data security and risk assessment in cloud computing

between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet ... sensitivity. Document NIST Special Publication 800-60 (Guide for Mapping Types of Information and Information Systems to Security Categories) provides a guide for organizations to conduct data classification

Analysis of Security in Big Data Related to Healthcare

related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different ... -Diez1 , Begofia Garcia-Zapirain Part of the Computer Law Commons; and the Information Security Commons 1. INTRODUCTION Large volumes of data are processed using big data in order to obtain information

Securing Pride: Sexuality, Security and the Post-Apartheid State

This paper explores the contestation that emerges between state security providers and communities in hybrid security situations. Rather than focusing on the failures of the state, the article ... explores how communities use contested (in)securities to create forms of security for themselves. The article argues for Soweto Pride as an example of vernacular security for black LGBT+ populations in

Conditions on Entry of Foreign-Flag Vessels into US Ports to Promote Maritime Security

time. the grave threats that in ternat io nal terrorists and rogue States pose to global order give rise to overriding maritime security concerns among port States, factors which argue strongly against a ... States must cooperate to develo p and imple­ ment efficient and effective conditions on port entry to ens ure the security of the port State and the international commercial system. Unreasonably