• No results found

secure information system development

An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi Layered Approach

An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi Layered Approach

... for information security have ...soft system think- ing approach is ineffective for addressing the wicked, complex problematic situation involving human ...how information systems se- curity can be ...

25

A Framework to Detect and Analyze Software Vulnerabilities: Analysis

A Framework to Detect and Analyze Software Vulnerabilities: Analysis

... geographical information system .the system will collecting the all requirement of the particular Domain which is required for achieving secure ...the secure product means the product ...

8

SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO TABLE OF CONTENTS

SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO TABLE OF CONTENTS

... Information Leakage: When a web site reveals sensitive data, such as developer comments or error messages, which may aid an attacker in exploiting the system. Sensitive information may be present ...

5

Development of a Secure Mobile E-Banking System

Development of a Secure Mobile E-Banking System

... his/her information for next usage. System architecture is a generic discipline to address objects (existing or to be created) called "systems", in a manner that helps reasoning about the structural ...

20

Development of a Secure Biometric Recognition System

Development of a Secure Biometric Recognition System

... the system determines the identity of a user by comparing the match score to a threshold value set by the ...ridge information into the process of fingerprint matching and used a changeable sized box in the ...

148

An Ontology Based Information Exchange Management System Enabling Secure Coalition Interoperability

An Ontology Based Information Exchange Management System Enabling Secure Coalition Interoperability

... C2 information exchange, requires machine-level understanding of the information exchange ...C2 information domain as well as the procedures utilized in managing the ...of information can be ...

11

Digitalization of Production Area Based on Raw Material Industries

Digitalization of Production Area Based on Raw Material Industries

... This system proposed a protocol for raw industries for secure and effective storage of information and various data regarding the production and distribution of raw ...a secure platform ...

5

A Survey on Untrusted Location Based Service Providers Using Secure Spatial Top K Query Processing

A Survey on Untrusted Location Based Service Providers Using Secure Spatial Top K Query Processing

... with information outsourcing, for which we can just review representative schemes because of space ...The system of information outsourcing was initially presented, in which an information ...

6

Adoption of New Information Economics for Informational System Development in Modern Day Call Center

Adoption of New Information Economics for Informational System Development in Modern Day Call Center

... of information system in call center as a case ...for information system development solely cannot eliminate business and IT disconnection in information system design ...

8

A Study on Cryptography Aspects and Approaches

A Study on Cryptography Aspects and Approaches

... A secure communication should ensure that the parties involved in the communication are who they claim to be. In other words, we should be protected from malicious users who try to impersonate one of the parties ...

7

BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System

BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System

... (SPS) system has become a more realistic solution for seamless public safety services that are enabled by integrating machine learning (ML) into heterogeneous edge computing ...

23

A secured biometric framework for multimedia 
		content protection

A secured biometric framework for multimedia content protection

... Suppose Alice has an encrypted multimedia file, and assume that a pirate web site or a pirate user, Bob, is distributing this file. In order for Alice to use the file, she must also have the correct key(s) to decrypt the ...

6

DEVELOPMENT OF A MULTIMEDIA SPATIAL INFORMATION SYSTEM

DEVELOPMENT OF A MULTIMEDIA SPATIAL INFORMATION SYSTEM

... Figure 3. Hardware configuration of the experimental multimedia PC. • Data level: Device-independent data query and processing algorithms and the interface between different[r] ...

5

Development of a Mobile Campus Information System

Development of a Mobile Campus Information System

... Campus Information System, each building is created as a feature and added to a new ...The information necessary for displaying are stored as attributes of the ...

7

Techniques of Strategic Evaluation and Control in Practices - A Case of Indian Companies Dr.S.K.Sharma Professor The Technological Institute of Textile & Sciences Birla Colony, Bhiwani-127021 (Haryana) Dr.Sunita Bharatwal Assistant Professor The Technolog

Techniques of Strategic Evaluation and Control in Practices - A Case of Indian Companies Dr.S.K.Sharma Professor The Technological Institute of Textile & Sciences Birla Colony, Bhiwani-127021 (Haryana) Dr.Sunita Bharatwal Assistant Professor The Technological Institute of Textile & Sciences Birla Colony, Bhiwani-127021 (Haryana)

... In order to realize the above objectives the study is confined to Indian companies’ i.e. private sector and public sector. 50 Chief Executive Officers/ Strategists working in these companies have been selected for ...

13

INTERNETWORKING INDONESIA JOURNAL

INTERNETWORKING INDONESIA JOURNAL

... The system on Parahita Craft website and the activities (‘actions’) yield more effective batik workgroups (or ...The system is expected to help sharing such ...the system, it is a direct knowledge ...

5

SECURITY FRAMEWORK FOR FILE TRANSFER IN A DISTRIBUTED ENVIRONMENT

SECURITY FRAMEWORK FOR FILE TRANSFER IN A DISTRIBUTED ENVIRONMENT

... Information sharing (file transfer) is the main essence of a distributed system. This phenomenon poses complicated security challenges even when the ultimate goal of distributed computing is to enhance ...

10

Where now for P2P?

Where now for P2P?

...  Supporting the development of secure mobile P2P systems Supporting the development of secure mobile P2P systems..  Worked with companies who want to utilise P2P Worked with companies[r] ...

37

Online Full Text

Online Full Text

... As with almost everything worth having, there is a price to be paid for building secure software. However, more and more, corporations are starting to view insecure software as a business problem rather than as a ...

6

Ambulance Alert Through Traffic Information System

Ambulance Alert Through Traffic Information System

... Abstract: Nowadays the road accidents in modern urban areas are increased to uncertain level. The loss of human life due to accident is to be avoided. Traffic congestion and tidal flow are major facts that cause delay to ...

6

Show all 10000 documents...

Related subjects