找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Human Aspects of Information Security, Privacy, and Trust; 4th International Co Theo Tryfonas Conference proceedings 2016 Springer Internat

[復(fù)制鏈接]
樓主: Filament
11#
發(fā)表于 2025-3-23 11:36:32 | 只看該作者
12#
發(fā)表于 2025-3-23 14:07:03 | 只看該作者
Anonymous Authentication with a Bi-directional Identity Federation in the Cloud. In the cloud architecture, user space may be shared across various resources, leading to possible data exposure, and making mapping of users and their privileges a challenging job. Moreover the user has to keep track of many passwords and tokens for different applications. In many setting, anonymi
13#
發(fā)表于 2025-3-23 18:07:54 | 只看該作者
14#
發(fā)表于 2025-3-24 01:01:21 | 只看該作者
15#
發(fā)表于 2025-3-24 04:10:18 | 只看該作者
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perthe software lifecycle, focusing on the early design phase and mitigating privacy risks. As a departure point, we used Personal Health Information Act (PHIA) in Nova Scotia to derive the following five proposed privacy patterns: 1-request an access 2-request a correction 3-request not to disclose Pe
16#
發(fā)表于 2025-3-24 08:29:13 | 只看該作者
Information Security Application Design: Understanding Your Usersonal methods of creating Personas are time-consuming. In this work, members of the Rapid7 User Experience team illustrate how they have quickly created Personas using the Proto-Persona method. The method, which encapsulates a collective set of beliefs that an organization has about their users, enab
17#
發(fā)表于 2025-3-24 11:14:33 | 只看該作者
Responsibility Modelling and Its Application Trust Managementt trust can be measured in-terms of reliability and dependability, while from a socio standpoint trust can be viewed as (a) the Need to trust, trust based on Identification, trust based on Competence and finally trust based on Evidence. In this paper we will develop a socio-technical model of trust
18#
發(fā)表于 2025-3-24 16:16:47 | 只看該作者
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksof human behaviour, based on relevant theories like deterrence theory and the theory of planned behaviour. We conduct a survey of IT professionals, managers and employees of selected banks from Nigeria as part of a sector case study focussed in this region. Our findings suggest that security by comp
19#
發(fā)表于 2025-3-24 22:37:41 | 只看該作者
Current Trend of End-Users’ Behaviors Towards Security Mechanismsare being rapidly modified sophisticatedly. Consequently, end-users’ behaviors are being changed, newly developed, and/or innovated as a result of the modifications of the mechanisms. Therefore, tracing the change of the end-user’s security related behaviors is an essential activity that should get
20#
發(fā)表于 2025-3-24 23:16:56 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 01:09
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
莱州市| 新巴尔虎左旗| 潮安县| 台湾省| 泉州市| 瑞丽市| 图木舒克市| 义乌市| 苍溪县| 绿春县| 双鸭山市| 苍南县| 玉田县| 海南省| 榆中县| 左云县| 屏东市| 固原市| 阿拉善盟| 武陟县| 彭阳县| 赤壁市| 丘北县| 建瓯市| 临清市| 法库县| 明光市| 武安市| 武宣县| 大埔区| 永城市| 枞阳县| 平阳县| 富裕县| 商洛市| 宁晋县| 西丰县| 河池市| 成都市| 弥渡县| 陵川县|