Results 121 to 130 of about 4,851,518 (333)

A secure solution on hierarchical access control [PDF]

open access: yesarXiv, 2011
Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem.
arxiv  

Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain [PDF]

open access: yes, 2009
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness.
Dimkov, T., Hartel, P.H., Pieters, W.
core   +2 more sources

Advancing Digital Transformation in Material Science: The Role of Workflows Within the MaterialDigital Initiative

open access: yesAdvanced Engineering Materials, EarlyView.
The MaterialDigital initiative drives the digital transformation of material science by promoting findable, accessible, interoperable, and reusable principles and enhancing data interoperability. This article explores the role of scientific workflows, highlights challenges in their adoption, and introduces the Workflow Store as a key tool for sharing ...
Simon Bekemeier   +37 more
wiley   +1 more source

Security Protocols in a Nutshell [PDF]

open access: yesarXiv, 2016
Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols.
arxiv  

Future Ideological Challenges: Fault Lines, Movements, and Competing Models (Annotated Bibliography Based on Survey of the Literature) [PDF]

open access: yes, 2005
“The Strategic Assessments Group tasked CISSM to survey the literature for information dealing with nascent or future idea-based themes, fault lines, and challenges as part of the Future Ideological Challenges research effort.”—Executive Summary from ...
Lahneman, William J.
core   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes

open access: yesAdvanced Engineering Materials, EarlyView.
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh   +3 more
wiley   +1 more source

Chaotic iterations versus Spread-spectrum: topological-security and stego-security [PDF]

open access: yesarXiv, 2011
A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure
arxiv  

Judges\u27 Awareness, Understanding, and Application of Digital Evidence [PDF]

open access: yes, 2011
As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence.
Kessler, Gary C.
core   +1 more source

On the Rigidity and Mechanical Behavior of Triply Periodic Minimal Surfaces‐Based Lattices: Insights from Extensive Experiments and Simulations

open access: yesAdvanced Engineering Materials, EarlyView.
This study examines the mechanical properties of triply periodic minimal surfaces (TPMS)‐based lattices, analyzing 36 architectures in elastic and plastic regimes. It evaluates the applicability of beam‐based scaling laws to TPMS lattices. Rigidity arises from the alignment of members with the load direction and solid regions preventing rotation.
Lucía Doyle   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy