Results 181 to 190 of about 79,561 (230)
Some of the next articles are maybe not open access.
In search of secure outsourcing
Computer Fraud & Security, 2009David Lacey is well known in security circles, not least because of his track record in IT, which includes being the former head of IT for the Royal Mail, and the original author of BS7799.
openaire +1 more source
The case for outsourcing security
Computer, 2002Deciding to outsource network security is difficult. The stakes are high, so it is no wonder that paralysis is a common reaction when contemplating whether to outsource or not. The primary argument for outsourcing is financial: a company can get the security expertise it needs much more cheaply by hiring someone else to provide it.
openaire +1 more source
Secure Outsourcing Image Feature Extraction
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015The amount and availability of user-contributed image data have grown to an unprecedented level during recent years. Social network service providers, like Facebook and Twitter, are heavily exploiting these vast valuable data to study user behaviors, social preferences, et al., for various business purposes.
openaire +1 more source
Information security standards for outsourcing
Information Security Technical Report, 1996Abstract The following is an example of an Information Security Standard that specifies the high level security requirements that should be considered when outsourcing mainframe services. It can also be used as a basis for the security components of an outsourcing contract.
openaire +1 more source
Secure outsourcing of large matrix determinant computation
Frontiers of Computer Science, 2020Jiayang Liu, Jingguo Bi, Mu Li
semanticscholar +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly

