239   Artículos

« Anterior     Página: 1 de 12     Siguiente »

 
en línea
Christian Schmitt,Peter Liggesmeyer     Pág. 15 - 34
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security infor... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
Yuelei Xiao and Haiqi Li    
Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Frank Moses,Kurt Sandkuhl     Pág. 54 - 68
The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect ... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
Erika Nazaruka     Pág. 28 - 43
Specification and traceability of security requirements is still a challenge since modeling and analysis of security aspects of systems require additional efforts at the very beginning of software development. The topological functioning model is a forma... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
Sungchae Park and Heung-Youl Youm    
As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject?s security, priva... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Saima Zareen, Adeel Akram and Shoab Ahmad Khan    
This work can be applied with the Requirements Engineering Process to elicit the security requirements for an information system?s development.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Maram Fahaad Almufareh and Mamoona Humayun    
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These practices must be incorporated into the software develop... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam    
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sang-Hyun Lee, Makoto Taniguchi, Rabi H. Mohtar, Jin-Yong Choi and Seung-Hwan Yoo    
The aim of this study is to assess the impact of rice-based food security on water, energy, land, and CO2 emissions from a holistic point of view using the Nexus approach, which analyzes tradeoffs between water, energy, and food management. In Japan, bot... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Revista: Sustainability    Formato: Electrónico

 
en línea
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert    
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se... ver más
Revista: Information    Formato: Electrónico

 
en línea
?arunas Grigaliunas, Michael Schmidt, Rasa Bruzgiene, Panayiota Smyrli and Vladislav Bidikov    
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kosuke Ito, Shuji Morisaki and Atsuhiro Goto    
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devic... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Amir Dirin,Teemu.H Laine,Ari Alamäki     Pág. pp. 177 - 196
The objective of this study was to unveil the importance of emotions and feelings in developing mobile-based tourism applications. We gathered and analyzed emotional requirements to develop a mobile context-aware application for tourists. Emotional requi... ver más

 
en línea
Keundug Park and Heung-Youl Youm    
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Sabina Szymoniak, Filip Depta, Lukasz Karbowiak and Mariusz Kubanek    
Artificial Intelligence is an indispensable element of the modern world, constantly evolving and contributing to the emergence of new technologies. We meet it in everyday applications, primarily using intelligent systems that aim to improve our lives. Ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Keundug Park and Heung-Youl Youm    
This paper proposes a solution to the transfer problem between blockchain-based heterogeneous cryptocurrencies and CBDCs, with research derived from an analysis of the existing literature. Interoperability between heterogeneous blockchains has been an ob... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Dimitra Georgiou and Costas Lambrinoudakis    
Currently, there are several challenges that cloud-based healthcare systems around the world are facing. The most important issue is to ensure security and privacy, or in other words, to ensure the confidentiality, integrity, and availability of the data... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pavel Smirnov,Stanislav Smyshlyaev     Pág. 77 - 84
The task of providing security to remote digital signature systems (?cloud? signature) for cases of end user running client-side components on devices without potential of ensuring trusted environment (most common examples of such devices are smartphones... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Donatas Ma?eika and Rimantas Butleris    
This paper presents how Model-Based System Engineering (MBSE) could be leveraged in order to mitigate security risks at an early stage of system development. Primarily, MBSE was used to manage complex engineering projects in terms of system requirements,... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 12     Siguiente »