Keyword: security

Found 180 papers in total
Handling least privilege problem and role mining in RBAC
2015,
For a given role‐based access control (RBAC) configuration, user‐role...
A hybrid ranking approach to estimate vulnerability for dynamic attacks
2011,
To enhance security in dynamic networks, it is important to evaluate the...
Analysis of the generalized self-shrinking generator
2011,
This work shows that the output sequences of a well‐known cryptographic...
Cryptanalysis of a quadratic knapsack cryptosystem
2011,
Wang and Hu [B. Wang and Y. Hu, Quadratic compact knapsack public‐key...
A new multi-objective model for supplier selection
2015,
In an order allocation model, selected evaluation criteria in most of the available...
When Lanchester met Richardson, the outcome was stalemate: A parable for mathematical models of insurgency
2015,
Many authors have used dynamical systems to model asymmetric war. We explore this...
The perceived impacts of AEO security certifications on supply chain efficiency - a survey study using structural equation modelling
2015,
A new topic that during the last years has come to the attention of researchers is...
Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
2013,
In this study we develop an analytic model for information security investment...
Detection of DDoS attacks using optimized traffic matrix
2012,
Distributed Denial of Service (DDoS) attacks have been increasing with the growth of...
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols
2012,
Recently, IT technologies are becoming focused on different traditional industries....
Linguistic protocols for secure information management and sharing
2012,
One issue which is essential for the security of calculations and communication as...
Executing mobile applications on the cloud: Framework and issues
2012,
Modern mobile devices, such as smartphones and tablets, have made many pervasive...
The role of gas infrastructure in promoting UK energy security
2012,
This paper considers whether commercially driven investment in gas infrastructure is...
Impact of carbon intensity and energy security constraints on China's coal import
2012,
Logistic and Gaussian Curves are adopted in this article to predict the coal...
Digital certificate management: Optimal pricing and CRL releasing strategies
2014,
The fast growth of e‐commerce and online activities places increasing needs for...
IT security auditing: A performance evaluation decision model
2014,
Compliance with ever‐increasing privacy laws, accounting and banking...
Institutional Influences on Information Systems Security Innovations
2012,
This research investigates information security management as an administrative...
The Association Between the Disclosure and the Realization of Information Security Risk Factors
2013,
Firms often disclose information security risk factors in public filings such as...
Assessing energy supply security: Outage costs in private households
2011,
The objective of this paper is to contribute to the topic of energy supply security by...
China's energy security, the Malacca dilemma and responses
2011,
China's rapid economic growth has led to a huge increase in oil imports. This has...
The security of energy infrastructure and supply in North Africa: Hydrocarbons and renewable energies in comparative perspective
2011,
While security risks to energy infrastructure and supply are frequently cited as a...
Energy, economy and development (EED) triangle: Concerns for India
2011,
In this paper we discuss issues involving energy security with economic growth and...
Energy security and renewable electricity trade–Will Desertec make Europe vulnerable to the ‘energy weapon’?
2011,
European vulnerability to energy weapon extortion in a Desertec‐style...
Energy security, efficiency and carbon emission of Chinese industry
2011,
An assessment is performed from major energy policy perspectives in China. Extensive...
Papers per page: