Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Multi-cloud applications: data and code fragmentation for improved security.

Subjects: *DATA privacy; *SECURITY management; *ELECTRONIC data processing

  • Source: International Journal of Information Security. Jun2023, Vol. 22 Issue 3, p713-721. 9p.

Record details

×
Academic Journal

Developing non-interactive MPC with trusted hardware for enhanced security.

Subjects: *TRUST; *SECURITY management; *HARDWARE

  • Source: International Journal of Information Security. Aug2022, Vol. 21 Issue 4, p777-797. 21p.

Record details

×
Academic Journal

Improving the security of direct anonymous attestation under host corruptions.

Subjects: *CORRUPTION; *SECURITY management; *ANONYMITY

  • Source: International Journal of Information Security. Aug2021, Vol. 20 Issue 4, p475-492. 18p.

Record details

×
Academic Journal

Optimization algorithm for k-anonymization of datasets with low information loss.

Subjects: *SECURITY management; *DATABASE management; *ANONYMITY

  • Source: International Journal of Information Security. Nov2018, Vol. 17 Issue 6, p631-644. 14p.

Record details

×
Academic Journal

ANS-based compression and encryption with 128-bit security.

Subjects: *AUTONOMIC nervous system; *NUMBER systems; *SECURITY management

  • Source: International Journal of Information Security. Oct2022, Vol. 21 Issue 5, p1051-1067. 17p.

Record details

×
Academic Journal

SAT-based model-checking for security protocols analysis.

Subjects: *SECURITY management; *INFORMATION technology; *DATA security

  • Source: International Journal of Information Security. Jan2008, Vol. 7 Issue 1, p3-32. 30p. 6 Diagrams, 8 Charts.

Record details

×
Academic Journal

Requirements engineering for trust management: model, methodology, and reasoning.

Subjects: *SOFTWARE engineering; *SECURITY management; *ORGANIZATIONAL structure

  • Source: International Journal of Information Security. Oct2006, Vol. 5 Issue 4, p257-274. 18p. 1 Black and White Photograph, 11 Diagrams, 15 Charts.

Record details

×
Academic Journal

Dependency-based security risk assessment for cyber-physical systems.

Subjects: *CYBER physical systems; *RISK assessment; *INDUSTRY 4.0

  • Source: International Journal of Information Security. Jun2023, Vol. 22 Issue 3, p563-578. 16p.

Record details

×
  • 1-10 of  27 results for ""SECURITY management""