Results 201 to 210 of about 236,356 (234)

Computer Security: Planning to Protect Corporate Assets

open access: closedJournal of Business Strategy, 1990
The author describes the strengths and weaknesses of current systems and reveals how planning can preempt a breach in security.
Melvin M. Schwartz
openalex   +3 more sources

Computer Security Threats Towards the E-Learning System Assets

open access: closed, 2011
E-learning system is a web-based system which is exposed to computer threats. Services or asset of the e-learning system must be protected from any computer threats to ensure the users have peace of mind when using it. It is important to identify and understand the threats to the system in order develop a secure system.
Zainal Fikri Zamzuri   +3 more
openalex   +2 more sources
Some of the next articles are maybe not open access.

Related searches:

Market‐inspired framework for securing assets in cloud computing environments

Software: Practice and Experience, 2022
AbstractSelf‐adaptive security methods have been extensively leveraged for securing software systems and users from runtime threats in online and elastic environments, such as the cloud. The existing solutions treat security as an aggregated quality by enforcing “one service for all” without considering the explicit security requirements of each asset ...
Giannis Tziakouris   +4 more
openaire   +2 more sources

Prioritization methodology of computing assets for connected vehicles in security assessment purpose

2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019
The paper is devoted to a preparation for security assessment of connected vehicles, prioritization points of attacks on structural elements in particular. Described approach is based on quality assessment of developed components and their accordance with model of attacker.
Andrey Barinov   +3 more
openaire   +1 more source

Cyber security information exchange based on Data Asset De-coupling factor in cloud computing

2011 IEEE Recent Advances in Intelligent Computational Systems, 2011
Cloud computing-based services have rapidly developed, but their security aspects are still at the initial stage of development. In order to preserve cyber security in cloud computing, cyber security information that will be exchanged within it needs to be identified and discussed.
T.M Bhraguram, M.S Sumesh
openaire   +1 more source

A Reference Architecture for Activities-as-Asset Distributed Ledger with Secure Private Computation

2023 International Conference on Information Networking (ICOIN), 2023
Chen-Fu Chiang   +5 more
openaire   +1 more source

Secure Multi-Party Computation for Digital Assets Custody Purpose - Analysis of Open-Source Implementations

2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), 2023
Daniel Roszak, Zakwan Jaroucheh
openaire   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Home - About - Disclaimer - Privacy