共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
As we mentioned earlier, testing ubicomp applications in field settings is particularly important. And although the approaches we discussed here can help, it's still difficult to field test and maintain a fully implemented system. Thus, a need exists for tools that allow researchers to rapidly deploy ubicomp applications in field settings. These tools should have paper prototyping's positive characteristics (ease of creation and deployment) but should also be scalable and interactive. While some tools are emerging for rapid field testing much work remains to be done. 相似文献
3.
4.
Most organizations manage computer security risk reactively by investing in technologies designed to protect against known system vulnerabilities and monitor intrusions as they occur. However, firewalls, cryptography, and antivirus protection address the symptoms, not the root cause, of most security problems. Buying and maintaining a firewall, for example, is ineffective if external users can access remotely exploitable Internet-enabled applications through it. Because hackers attack software, improving computer security depends on proactively managing risks associated with software and software development. The current "penetrate and patch" approach of fixing broken software only after it has been compromised is insufficient to control the problem 相似文献
5.
Fang Fang Manoj Parameswaran Xia Zhao Andrew B. Whinston 《Information Systems Frontiers》2014,16(3):399-416
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdependent security risk they add is a problem affecting market efficiency. Connected organizations become part of entire networks, and are subject to threats from the entire network; but members’ security profile information is private, members lack incentives to minimize impact on peers and are not accountable. We model the problem as a signaling-screening game, and outline an incentive mechanism that addresses these problems. Our mechanism proposes formation of secure communities of organizations anchored by Security Compliance Consortium (SCC), with members held accountable to the community for security failures. We study the interconnection decisions with and without the mechanism, and characterize conditions where the mechanism plays roles of addressing moral hazard and hidden information issues by screening the organizations’ security types and/or by providing them incentives to improve. We also discuss the welfare gains and the broad impact of the mechanism. 相似文献
7.
Jaakko T. Lehikoinen Juha Lehikoinen Pertti Huuskonen 《Personal and Ubiquitous Computing》2008,12(8):543-553
Ubiquitous computing contains a huge promise for more intelligent services that are available anywhere and are able to dynamically
adapt to the users’ current context. However, what necessarily follows such an environment is the compromising of the users’
privacy. We aim at analyzing this complex issue by applying and extending Altman’s theoretical privacy framework, well known
in social sciences, to privacy in ubicomp. Altman understands privacy as a two-way interactive process, which makes the approach
promising in analyzing ubicomp where people, devices and the environment interact with each other. We point out similarities
between the existing model and the features of ubicomp environment, and verify the results by applying and analyzing the resulting
extended framework to typical ubicomp use cases. Based on the analysis, we argue that privacy in ubicomp can be modeled similarly
to privacy in general by extending the model to cover such factors as mediation and non-human actors.
相似文献
Jaakko T. LehikoinenEmail: |
8.
当前越来越多的企业已经把信息安全看做影响业务发展的核心因素之一,信息安全管理已经成为企业管理的重点。本文对当前企业信息安全风险的现状展开了探讨,并就信息安全政策,安全管理手段等方面进行了剖析,为企业做好、做强信息安全管理体系给出了一些通用性的标准,对企业构建信息安全管理体系,消除信息安全隐患,避免信息安全事件造成的损失,确保信息系统安全、稳定运行具有探索意义。 相似文献
9.
10.
11.
Artiom Alhazov 《New Generation Computing》2004,22(4):299-310
Evolution-communication P systems are a variant of P systems allowing both rewriting rules and symport/antiport rules, thus
having separated the rewriting and the communication. The purpose of this paper is to solve an open problem stated in Reference,1) namely generating the family of Turing computable sets of vectors of natural numbers instead of the family of Turing computable
sets of natural numbers. The same construction also reduces the 3-membrane non-cooperative case and the 2-membrane 1-catalyst
case to the 2-membrane non-cooperative case. Also, EC P automata are introduced and it is proved that 2-membrane EC P automata
with a promoter can accept all recursively enumerable languages. Finally, a definition of an extended system is given, and
its universality is proved using the rules of more restricted types.
Artiom Alhazov: He has graduated from Mathematics and Computer Science, State University of Moldova in 2001, and is currently a Ph.D. student
in Chişinăm, Moldova, and Tarragona, Spain. He has won prizes at 3 National Olympiads in Informatics and in Mathematics (1995
and 1996), participated at 8th International Olympiad in Informatics (Veszprem, Hungary, 1996). He has experience in programming
and teaching, and has published 18 papers, mostly in Membrane Computing. His interests are Origami, Mathematics, Programming,
Theoretical Computer Science, Formal Linguistics and Biocomputing. 相似文献
12.
Privacy risks in recommender systems 总被引:1,自引:0,他引:1
《Internet Computing, IEEE》2001,5(6):54-63
Recommender system users who rate items across disjoint domains face a privacy risk analogous to the one that occurs with statistical database queries 相似文献
13.
14.
Martin Whitworth 《Network Security》2005,2005(10):16-19
15.
高其海 《网络安全技术与应用》2014,(5):112-113
信息化时代的飞速发展给人们的生活带来了很大便利,人们已经从一个传统金融模式时代迈向了由网络作为基础的网络经济时代,金融计算机网络已经逐渐的渗入到了我们的日常生活.大数据、物联网和移动支付的兴起推动了金融计算机网络发展,同时越来越多的安全隐患暴露了出来.本文通过系统分析,旨在为广大金融IT产品用户找到一种规避风险的安全服务. 相似文献
16.
17.
Herbert H. Thompson Ph.D. 《Datenschutz und Datensicherheit - DuD》2006,30(10):604-606
Web Services have helped many organizations revitalize their legacy applications by offering a simple, language and platform independent way for applications to communicate. There are, however, many common mistakes made when implementing Web Services that create infrastructure vulnerabilities and leave applications exposed. This paper takes a look, from the developer perspective, at some of the more insidious vulnerabilities that may come bundled with web services with a view towards prevention. 相似文献
18.
Claudia Eckert 《Datenschutz und Datensicherheit - DuD》2012,36(12):861-861
19.
Science China Information Sciences - 相似文献
20.
Recent scalable multicast streaming protocols for on-demand delivery of media content offer the promise of greatly reduced server and network bandwidth. However, a key unresolved issue is how to design scalable content distribution systems that place replica servers closer to various client populations and route client requests and response streams so as to minimize the total server and network delivery cost. This issue is significantly more complex than the design of distribution systems for traditional Web files or unicast on-demand streaming, for two reasons. First, closest server and shortest path routing does not minimize network bandwidth usage; instead, the optimal routing of client requests and server multicasts is complex and interdependent. Second, the server bandwidth usage increases with the number of replicas. Nevertheless, this paper shows that the complex replica placement and routing optimization problem, in its essential form, can be expressed fairly simply, and can be solved for example client populations and realistic network topologies. The solutions show that the optimal scalable system can differ significantly from the optimal system for conventional delivery. Furthermore, simple canonical networks are analyzed to develop insights into effective heuristics for near-optimal placement and routing. The proposed new heuristics can be used for designing large and heterogeneous systems that are of practical interest. For a number of example networks, the best heuristics produce systems with total delivery cost that is within 16% of optimality. 相似文献