Results 301 to 310 of about 4,301,094 (348)
Some of the next articles are maybe not open access.
Information Technology and People, 2013
Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security ...
Cheolho Yoon, Hyungon Kim
semanticscholar +1 more source
Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security ...
Cheolho Yoon, Hyungon Kim
semanticscholar +1 more source
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
, 2016Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world.
B. Gupta, D. Agrawal, S. Yamaguchi
semanticscholar +1 more source
Essential Computer Science, 2021
Paul D. Crutcher, N. Singh, Peter Tiegs
semanticscholar +1 more source
Paul D. Crutcher, N. Singh, Peter Tiegs
semanticscholar +1 more source
Threshold computation and cryptographic security
SIAM Journal on Computing, 1993Summary: Threshold machines are Turing machines whose acceptance is determined by what portion of the machine's computation paths are accepting paths. Probabilistic machines are Turing machines whose acceptance is determined by the probability weight of the machine's accepting computation paths. In 1975, Simon proved that for unbounded-error polynomial-
Yenjo Han+2 more
openaire +4 more sources
Computer Security and Risky Computing Practices
Journal of Organizational and End User Computing, 2004Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing ...
Kregg Aytes, Terry Connolly
openaire +2 more sources
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +4 more sources
ACM SIGSAC Review, 1982
Due to the Multiplicity of risks to computer software as well as the time involved and expenses required to provide safety for the programs, protection for a firm's software has become a complex matter. Many security measures have been explored in recent years, especially with regard to general computer facility safety; the location of computer ...
openaire +2 more sources
Due to the Multiplicity of risks to computer software as well as the time involved and expenses required to provide safety for the programs, protection for a firm's software has become a complex matter. Many security measures have been explored in recent years, especially with regard to general computer facility safety; the location of computer ...
openaire +2 more sources
Computer Security Requirements: An Investigation of Computer Security Costs
1976Abstract : A study of the costs associated with the three most popular security problem avoidance techniques provides a lower bound estimate of $3 million per year saving by applying technology. The cost savings estimated appear conservative because of the difficulty in quantifying costs of avoidance methods, and the omission of any consideration of ...
openaire +2 more sources
Habituation effects in computer security warning
Information Security Journal, 2018Ammar Amran, Z. Zaaba, M. Singh
semanticscholar +1 more source
2007
GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist.
openaire +1 more source
GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist.
openaire +1 more source