Results 11 to 20 of about 13,471 (161)
Secured Workstation to Process the Data of Different Classification Levels
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA).
Zbigniew Zieliński +4 more
doaj +1 more source
Access control to patient information has become increasingly important in healthcare systems. It is vital to enhance the security of healthcare systems to avoid data loss despite the various security policies imposed by healthcare management.
T. Haritha, A. Anitha
doaj +1 more source
Economic Security - A Principal Component of Multilevel Security Concept in Global Economy
This paper is focused on the problem of the economic security as the principal component of a multilevel security concept in the present global economy.
Alexander Kelisek +3 more
doaj +1 more source
The Multilevel Encryption Model: A review [PDF]
Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the level of security by adding multiple layers of encryption, which makes it more difficult to ...
Mais Irreem Kamal, Laheeb Ibrahim
doaj +1 more source
Multilevel classification of security concerns in cloud computing
Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers.
Syed Asad Hussain +4 more
doaj +1 more source
Security and Attitudes Toward Globalization: A Multilevel Analysis
Globalization implicates a number of social psychological processes and outcomes, including openness to ideas, products, and people from outside one’s national boundaries.
James E. Cameron +2 more
doaj +1 more source
Secure Symmetrical Multilevel Diversity Coding [PDF]
Submitted to the IEEE Transactions on Information Theory in May 2011.
Balasubramanian, Anantharaman +4 more
openaire +2 more sources
Multi-Level Cloud Datacenter Security Using Efficient Hybrid Algorithm
Security is currently the main boundary for cloud-based administrations. It is not adequate to just consolidate the cloud by adding a couple of additional controls or component answers for your current organization security programming.
Koushik Chakraborty +5 more
doaj +1 more source
Study on enhancing integrity for BLP model
A model which enhances the integrity of BLP model was presented based on the BLP model.This model was called as EIBLP model.Some necessary restraints to upward information flow were appended in EIBLP without chang-ing the information flow direction(down ...
LIU Yan-ming +2 more
doaj +2 more sources
MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY [PDF]
Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems.
Andrey V. Masloboev +2 more
doaj

