首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
In this special issue, we focus on the challenges of managing organizational security, examining some of the nontechnical aspects of security that assure that the technology is chosen, implemented, and used appropriately and well.  相似文献   

4.
5.
6.
7.
Often, the economic considerations of security are more important than the technical considerations. Guests editors Ross Anderson and Bruce Schneier present six articles that delve into all aspects of this economic angle.  相似文献   

8.
In the post-9/11 world, information technology is an indispensable part of making our nation safer. Critical national security missions in the context of various data and technical domain challenges could benefit from establishing an intelligence and security informatics research discipline. Just as biomedical informatics addresses information management issues in biological and medical applications, ISI would address such issues for intelligence and security applications.The knowledge discovery from databases methodology shows promise in addressing unique ISI challenges. KDD has already proved successful in other information-intensive, knowledge-critical domains including business, engineering, biology, and medicine.This article is part of a special issue on Homeland Security.  相似文献   

9.
Security and trust have become important considerations in the design of virtually all modern embedded systems. The requirements of secure and trusted design are unique: Secure design emphasizes information leakage (or prevention thereof) and dependable behavior. Even strong cryptographic algorithms are of little use if the underlying processor can be tricked into releasing cryptographic keys. This leads to unique design techniques such as design and implementation of boundaries for logical and physical protection, design of protected storage and secure-computing primitives, runtime measurement and reporting of security properties, and implementation of side-channel-resistant hardware and software. Eventually, the embedded-system designer must cope with security as yet another requirement in addition to existing functional requirements, performance, power, and cost. This special issue presents six articles that address various critical aspects of secure embedded-systems design.  相似文献   

10.
11.
12.
13.
《Computer》1986,19(6):6-7
  相似文献   

14.
15.
16.
17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号