Results 251 to 260 of about 2,693,777 (322)
Application of deep learning in behavior recognition and early warning system for campus safety management. [PDF]
Liu L.
europepmc +1 more source
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Information Security Management System
Applied Approach to Privacy and Security for the Internet of Things, 2020Security of information is always a challenging domain for any computer network organization. An organization always sets different types of policies with the course of time so that no information can be leaked. Some external or some internal factors of an organization play important roles in revealing the information. An organization mainly depends on
M. K. Srivastav
openaire +2 more sources
Information Security Management System in Distributed Information Systems
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019This research is aimed at the implementation issue of an information security management system in distributed information systems as an important requirement for increasing the level of information and cyber security. Based on the best international experience, the authors attempt to determine the features and importance of implementing an information
Valentyna Pleskach +2 more
openaire +2 more sources
Information security management system standards
Datenschutz und Datensicherheit - DuD, 2011This article presents ISO’s most successful information security standard ISO/IEC 27001 together with the other standards in the family of information security standards — the socalled ISO/IEC 2700x family of information security management system (ISMS) standards and guidelines. We shall take a brief look at the history and progress of these standards,
E. Humphreys
openaire +2 more sources
Information security management system challenges within a cloud computing environment
International Conference on Future Networks and Distributed Systems, 2018Cloud computing is a significant model offering dynamically scalable and redundant resources, employing the concept of software multi-tenancy, allowing elasticity and cost effectiveness.
Mais Arafat
semanticscholar +1 more source
Information Systems Security Management
2020Information Systems Security (ISS) is a broad term that covers all security aspects in enterprises, including system analysis and design method, manual information systems, managerial issues, and both societal and ethical problems. Information systems security management (ISSM) evolved recently to be a discipline by itself.
openaire +1 more source

