Auswahl der wissenschaftlichen Literatur zum Thema „Security and efficiency of information system“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security and efficiency of information system" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security and efficiency of information system"

1

Kiedrowicz, Maciej, und Jerzy Stanik. „Method for assessing efficiency of the information security management system“. MATEC Web of Conferences 210 (2018): 04011. http://dx.doi.org/10.1051/matecconf/201821004011.

Der volle Inhalt der Quelle
Annotation:
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency of the security system mainly depends on the functional properties of its components and other factors occurring in its environment. The article mainly focuses on security configuration, i.e. technical configuration and security organization configuration. The thesis was adopted that the efficiency of the security system may be considered as a set-theoretic efficiency sum of the security configurations invoked in such system. Additionally, it was assumed that a prerequisite for the desired measures (indicators) of the efficiency assessment of the SS shall be to propose such measures and develop appropriate ways (methods) of their calculation. The efficiency measure for the SS as well as two methods of efficiency assessment of the SS were proposed in the article.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kim, Taekyung. „Tourism Information Reservation System considering the Security and Efficiency“. Journal of the Korea Society of Digital Industry and Information Management 11, Nr. 2 (30.06.2015): 67–72. http://dx.doi.org/10.17662/ksdim.2015.11.2.067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zeng, Yi. „Related Research on the Crime of Illegal Invasion into Computer Information System“. Advanced Materials Research 1079-1080 (Dezember 2014): 733–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.733.

Der volle Inhalt der Quelle
Annotation:
The rapid development of information technology makes the construction of computer information system possible, greatly facilitates people’s lives and improves the efficiency of learning and production. Computer information system is also applied in many sensitive areas. To improve the management efficiency of information and data, the behaviors that related computer information systems are illegally invaded are increasingly rampant and have seriously endanger national security, territorial security, sovereignty security, political security, military security, economic security, cultural security, science and technology security, ecological security and information security. In terms of the crime of illegal invasion into computer information system, this paper studies from several aspects, the cognizance of crime and non-crime, the accomplishment and attempt of the crime, subsequent criminal behaviors and legislative perfection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Livshits, Ilia, und Pavel Lontsikh. „FORMATION OF METRICS TO MEASURE INFORMATION SECURITY MANAGEMENT SYSTEM EFFICIENCY“. Proceedings of Irkutsk State Technical University 112, Nr. 5 (Mai 2016): 65–72. http://dx.doi.org/10.21285/1814-3520-2016-5-65-72.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Dai, Jing Jing, Hui Min Hu und Qing Cai. „Effectiveness Evaluation of Security System Based on Entropy Theory“. Applied Mechanics and Materials 40-41 (November 2010): 806–11. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.806.

Der volle Inhalt der Quelle
Annotation:
With the security industry developing rapidly and the number of security systems increasing continuously in recent years, security systems provide a positive effect on society security in China, but many of them became vulnerable or even useless because of the problem of irrational allocation of resources. In order to evaluate security system efficiency to avoid these problems, we present the concept of efficiency entropy based on the Shannon information theory, and build an Efficiency Entropy Evaluation Model which can be used to evaluate the efficiency of the security system quantitatively. It represents security system effectiveness in single node layer and the entire security network layers. So the effectiveness of the whole security system is calculated quantitatively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Goldobina, Anastasiya, und Valentin Selifanov. „EFFICIENCY EVALUATION OF PROTECTION TOOLS OF STATE INFORMATION SYSTEMS“. Interexpo GEO-Siberia 6, Nr. 1 (2019): 115–21. http://dx.doi.org/10.33764/2618-981x-2019-6-1-115-121.

Der volle Inhalt der Quelle
Annotation:
Protection components of state information system represent the uniform mechanism capable to protect confidential information. If one of protection elements does not work effectively, it will become a problem for the entire information security system. Public information systems need to take into account all available ways to prevent information leakage, for this, operators should evaluate the efficiency. This article proposes possible solutions of the problem.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lajevskis, Vladimirs, Pjotrs Dorogovs und Andrejs Romanovs. „It Security System Development for State Institution“. Scientific Journal of Riga Technical University. Computer Sciences 39, Nr. 1 (01.01.2009): 27–32. http://dx.doi.org/10.2478/v10143-010-0003-0.

Der volle Inhalt der Quelle
Annotation:
It Security System Development for State Institution Nowadays the work efficiency and proficiency of public and private sector substantially depend on information technologies. In connection with the large volume of information stored in automated systems throughout the public sector, special attention should be paid to information security and security of actives. The main goals and tasks of information security, frameworks of IT security system are defined and analyzed in the paper; the standard of IT security system development is investigated, as well as international standards significance and guidance application within the development of IT security system. On the bases of research, the features of the State institutions are defined, which are necessary to take into consideration during the development of IT security system. The primary tasks of IT security system development are emphasized and the technique of development of IT security systems for State institutions is worked out.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Suhanov, Valeriy, und Oleg Lankin. „Methodology of logical design of information support for distributed information systems of critical application“. Modeling of systems and processes 14, Nr. 3 (22.09.2021): 67–73. http://dx.doi.org/10.12737/2219-0767-2021-14-3-67-73.

Der volle Inhalt der Quelle
Annotation:
One of the most promising new information technologies is analytical databases that allow us to analyze the dynamics of the behavior of the control object in the historical aspect. The introduction of analytical databases increases the efficiency of information systems. In particular, one of the criteria for effectiveness is the security of an information system, on which analytical databases have a fairly significant impact, which at first glance is not obvious. In the material of this article, the problems of organizing and implementing security in analytical databases will be considered, as well as the method of logical design of information support for distributed information systems of critical application under the prism of ensuring the security of this system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zhao, Dong Ming, und Kai Feng Zhu. „Network Security Isolation System Based on Information Filtering“. Applied Mechanics and Materials 707 (Dezember 2014): 458–61. http://dx.doi.org/10.4028/www.scientific.net/amm.707.458.

Der volle Inhalt der Quelle
Annotation:
Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Klenin, Dmitriy, und Elena Maksimova. „The Model of Intrusion into the Information System“. NBI Technologies, Nr. 3 (Januar 2019): 19–23. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.3.

Der volle Inhalt der Quelle
Annotation:
Categories ‘attack’, ‘intrusion’ and ‘incident’ of information security are defined. The types of intrusions into the information system are revealed, and their brief analysis is given. The proposed model of intrusion into the information system will allow to increase its efficiency at almost all stages of the information security system life cycle. The use of the proposed model is associated with the solution of specific practical problems in the field of information security, including the definition of vulnerabilities of the information system. The latter, in turn, is necessary to determine the elements of the protection system. For example, at the design stage of the information security system, when choosing software protection you need to take into account the location of the intruder relative to the attacked object. When working with functioning systems of information protection, i.e. at the solution of questions of modernization or optimization, changes in the system of information security are resolved in accordance with statistical data for the intrusion into the information system with available results of information security incidents, with the forecast data. Thus, the proposed model of intrusion into the information system is one of the external conditions when working with the information system of the organization (enterprise) may well determine (set) the level of risk of information security of the enterprise.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Security and efficiency of information system"

1

Vránová, Nikola. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223423.

Der volle Inhalt der Quelle
Annotation:
This thesis focuses on the analysis of current information system of the selected points to its possible shortcomings and errors. Information obtained from the analyzes will lead to appropriate solutions to problems. The aim of the current system is customized to meet the needs of its users, so that the information system should be flexible, intuitive and clear
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Parolek, Pavel. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223500.

Der volle Inhalt der Quelle
Annotation:
My thesis focuses on information system analysis of local municipalities, specifically on Břeclav Municipal Office information system. My thesis evaulates the information system's efficiency, identifies its weak points and suggests measures eliminating these weak points.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Urban, Petr. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223610.

Der volle Inhalt der Quelle
Annotation:
This thesis is focused on the information systems; it describes the available innovations applied on the established information systems. It describes the methods that are suitable for testing the effectiveness of the information systems. The practical part includes the current state of the chosen information system of a company, further it tests the effectiveness of the information system and finally it evaluates the received information and recommends the possible changes that would lead to the higher effectiveness of the work of the information system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kůgel, Roman. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223433.

Der volle Inhalt der Quelle
Annotation:
This master thesis is aimed at information systems and a correct method of their selection. The theoretical part introduces the dilemma within information systems especially description types of the systems and their examination and selection. An own solution consists of information strategy determination and the selection of convenient information system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cherynová, Nikol. „Posouzení informačního systému společnosti a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402607.

Der volle Inhalt der Quelle
Annotation:
The diploma thesis „Assessment of a Company's Information System and Proposal for Modifications” deals with the issue of security and efficiency of the information system. The thesis is divided into three parts. The first theoretical part explains the basic concepts that are subsequently used in the thesis. The second part contains analytical starting points and introduction of the company, its analysis and analysis of the information system. This information is the basis for the last proposal part, where its content is to increase the security of the company's information system. Part of the proposal also includes an economic assessment, where benefits and costs are described. The work is elaborated in order to achieve the assigned goal of the thesis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Karlsson, Daniel. „Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.

Der volle Inhalt der Quelle
Annotation:
Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. In particular, tracing causes of errors and establishing compliance takes a long time and effort. The company Chaintraced is developing an application to automate the process by acting as a third party to digitalize and manage the certificates. Introducing a third party into a business-to-business process requires that data integrity is preserved and that information reaches its expected destination. Recent research has indicated that distributed ledger technologies showpromise to fulfill these requirements. In particular, blockchain-based systems offer immutability and traceability of data, and can reduce the trust needed between different parties by relying on cryptographic primitives and consensus mechanisms. This thesis investigates the application of distributed ledger technology to further automate the Swedish heavy industry supply chain and reduce the trust needed in a third party managing the certificates. Requirements for an industrial strength system is set up and several distributed ledger technology solutions are considered to fit the use case of Swedish heavy industry. A proof of concept based on the findings is implemented, tested and compared with a centralized database to explore its possible usage in the supply chain with regard to feasibility, immutability, traceability and security. The investigation resulted in a prototype based on Hyperledger Fabric to store product certificates. The solution provides certain guarantees to immutability and security while being developed with feasibility for deployment in mind. The proposed solution is shown to be slow compared to a centralized solution but scales linearly with number of certificates and is considered within bounds for the use case. The results also show that the proposed solution is more trustworthy than a centralized solution, but that adopting blockchain technology is an extensive task. In particular, trustworthiness and guarantees provided by the solution is highly dependent on the feasibility aspect and the investigation concludes that adoption of blockchain technology within the Swedish heavy industry must take this into consideration.
Hanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Malá, Eva. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223882.

Der volle Inhalt der Quelle
Annotation:
This thesis deals with the assessment of information systems of the selected company and proposals for amendments of it. The content of the first part is the explanation of basic terms used in this field. The thesis also analyzes the current status of the infor-mation system and the assessment of its efficiency. Based on the evaluation of the anal-ysis the individual solutions for improving the current state of the information system of the company in terms of balance and efficiency are proposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Igbonagwam, Okey Azu. „The Role of Security Clearance, Users' Involvement, and Computer Self-Efficacy in the Efficiency of Requirements-Gathering Process: An Information-Systems Case Study in the U.S. Military“. NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/184.

Der volle Inhalt der Quelle
Annotation:
The central research problem of this study was the challenges that occur with the United States Joint Warfighters Center's (JWFC) implementation of information systems (IS) requirements-gathering process. Thus, this study investigated the contribution of perceived security clearance (PSC), developer perceived user involvement (DPUI), and computer self-efficacy (CSE) to efficiency of the perceived requirements-gathering process (PERGP). Due to the perceived efficiency of IS development, the U.S. Department of Defense statutory document called the Joint Capability Integration and Development System (JCIDS), mandated that as an IS development requirement, the rapid development of IS was needed to sustain U.S. warfighters. As a result, the central aim of this study was to look at several variables that may predict the efficiency to the IS requirements-gathering process at JWFC. The central research question behind this study was: What are the contributions of PSC, DPUI, and CSE to the PERGP at the JWFC? This study proposed a theoretical model, and two statistical methods were used to formulate models and test predictive power: Multiple Linear Regression (MLR) and Ordinal Logistic Regression (OLR). The sample size of this study included 61 IS developers from JWFC. The results of this study indicated a strong reliability for the measures of all variables (PSC, DPUI, CSE, and PERGP). Moreover, results of both models developed indicated that DPUI is a significant contributor to PEGRP, while CSE was demonstrated to be significant contributor to PEGRP only via the OLR model providing the indication that the relationships among the measured variables was non-linear. Additionally, results demonstrated that DPUI was the most significant contributor to PEGRP in both models, while PSC had little or no contribution to the dependent variable, PEGRP. This study also identified two key implications for practice and research. The first impaction of this study is the investigation of unique factors such as PSC and PEGRP in the context of military-based IS development within DOD organizations. Results of this study can help managers in government organizations that are faced with security clearance issues to identify contributors in the early phase of IS development that could possibly hinder PEGRP. The second implication of this study is the non-significant results related to PSC in this investigation. For researchers, such results may need future validation in other governmental and military-based organization. Moreover, such results may indicate to managers in government organizations that are faced with security clearance issues that security clearance, at least as indicated by the results of this study, has no major hindering on the PEGRP. These results maybe profound in their implications and, as such, needed additional validations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kouřil, Martin. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223283.

Der volle Inhalt der Quelle
Annotation:
This master thesis is aimed at information systems and a correct method of their selection. The theoretical part introduces the dilemma within information systems, ERP systems, their examination and selection. Fisrtly there are some analyses of the existing system operating in company and after that follows own solution which consists of information strategy determination and the selection of convenient information system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Černín, Ondřej. „Posouzení informačního systému firmy a návrh změn“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318316.

Der volle Inhalt der Quelle
Annotation:
The master thesis is focused on the assessment of the company information system and the proposal for changes. Primarily, the thesis focuses on adding new module Wages and Human Resources to existing information system. As the second part of the implemented change, proposals are presented in the work to improve the current situation in the field of information security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Security and efficiency of information system"

1

Examining challenges and wasted taxpayer dollars in modernizing border security IT systems: Hearing before the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, February 6, 2014. Washington: U.S. Government Printing Office, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dhillon, Gurpreet. Managing Information System Security. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

International Institute for Educational Planning., Hrsg. An efficiency-based management information system. Paris: Unesco, International Institute for Educational Planning, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Atkins, Cathy. Protecting water system security information. Denver, Colo: National Conference of State Legislatures, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

NHS Management Executive. Information Management Group. Information system security and you. London: Department of Health, 1992.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Office, General Accounting. Information security: Advances and remaining challenges to adoption of public key infrastructure technology : report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chopra, Abhishek, und Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Swanson, Marianne. Security self-assessment guide for information technology system. Gaithersburg, MD: U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Division, Montana Legislature Legislative Audit. Information processing facility and central applications: Information system audit. Helena, Mont: Legislative Audit Division, State of Montana, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Security for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Security and efficiency of information system"

1

Liu, Weiwei, Yi Mu und Guomin Yang. „An Efficient Privacy-Preserving E-coupon System“. In Information Security and Cryptology, 3–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16745-9_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Xu, Zibin, Lijun Wei, Jing Wu und Chengnian Long. „A Blockchain-Based Digital Copyright Protection System with Security and Efficiency“. In Communications in Computer and Information Science, 34–49. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6478-3_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jin, Haimin, Duncan S. Wong und Yinlong Xu. „An Efficient Password-Only Two-Server Authenticated Key Exchange System“. In Information and Communications Security, 44–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77048-0_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Marcu, Marius, und Dacian Tudor. „Energy Efficiency Measurements of Mobile Virtualization Systems“. In Security and Privacy in Mobile Information and Communication Systems, 88–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Badrinath, G. S., Aditya Nigam und Phalguni Gupta. „An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores“. In Information and Communications Security, 374–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Niemann, Raik, Nikolaos Korfiatis, Roberto Zicari und Richard Göbel. „Evaluating the Energy Efficiency of OLTP Operations“. In Availability, Reliability, and Security in Information Systems and HCI, 28–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Wei, Zhuo, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng und Robert H. Deng. „IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)“. In Information Security Practice and Experience, 638–47. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_39.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sadiah, Shahidatul, Toru Nakanishi und Nobuo Funabiki. „Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes“. In Advances in Information and Computer Security, 262–78. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lee, Kijeong, Byungjoo Park und Gil-Cheol Park. „Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN“. In Communications in Computer and Information Science, 64–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Barreno, F., M. Santos und M. Romana. „Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers“. In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 94–104. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security and efficiency of information system"

1

Erulanova, Aizhan, Gulzhan Soltan, Aizhan Baidildina, Marzhan Amangeldina und Askhat Aset. „Expert System for Assessing the Efficiency of Information Security“. In 2020 7th International Conference on Electrical and Electronics Engineering (ICEEE). IEEE, 2020. http://dx.doi.org/10.1109/iceee49618.2020.9102555.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hentea, Mariana. „Intelligent System for Information Security Management: Architecture and Design Issues“. In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3055.

Der volle Inhalt der Quelle
Annotation:
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computing systems based on intelligent techniques that support continuous monitoring and controlling plant activities. Intelligence improves an individual’s ability to make better decisions. This paper presents a proposed architecture of an Intelligent System for Information Security Management (ISISM). The objective of this system is to improve security management processes such as monitoring, controlling, and decision making with an effect size that is higher than an expert in security by providing mechanisms to enhance the active construction of knowledge about threats, policies, procedures, and risks. We focus on requirements and design issues for the basic components of the intelligent system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jiao, Teng, Kun Zhang, Wen Zhang und Xiuzhen Dong. „Improve Communication Efficiency for the Physiological Information Monitor System Based on Zigbee“. In 2009 Second International Symposium on Intelligent Information Technology and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/iitsi.2009.46.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bai, Zhu-Lan, und Bing Cai. „Effect of E-Government on the Efficiency of Information Service“. In 2009 International Conference on E-Business and Information System Security (EBISS). IEEE, 2009. http://dx.doi.org/10.1109/ebiss.2009.5137970.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kim, Jeom-Goo. „The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement“. In 2008 International Conference on Information Science and Security (ICISS 2008). IEEE, 2008. http://dx.doi.org/10.1109/iciss.2008.38.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Drozdov, Nikita A., Julia A. Tagiltseva, Marina A. Vasilenko und Elena L. Kuzina. „Modeling of efficiency assessment for enterprises economic activity in environmental system“. In 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2017. http://dx.doi.org/10.1109/itmqis.2017.8085926.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Goncharov, Nikita, Alexander Dushkin und Igor Goncharov. „Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences“. In 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA). IEEE, 2019. http://dx.doi.org/10.1109/summa48161.2019.8947513.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sever, Dubravko, und Tonimir Kisasondi. „Efficiency and security of docker based honeypot systems“. In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400212.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Aniskina, Nina N., und Anastasiia M. Kantsulina. „An Approach to the Establishment of an Automated Energy Efficiency Improvement System“. In 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2019. http://dx.doi.org/10.1109/itqmis.2019.8928362.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Goryunova, V. V., T. I. Goryunova und Y. V. Molodtsova. „Integration and Security of Corporate Information Systems in the Context of Industrial Digitalization“. In 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA). IEEE, 2020. http://dx.doi.org/10.1109/summa50634.2020.9280663.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security and efficiency of information system"

1

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer und Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Lane, Brendan F., und Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, Januar 2002. http://dx.doi.org/10.21236/ada418505.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Roback, Edward. Automated information system security accreditation guidelines. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4378.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Skormin, Victor A. Biological Approach to System Information Security (BASIS). Fort Belvoir, VA: Defense Technical Information Center, Dezember 2003. http://dx.doi.org/10.21236/ada420842.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lenaeu, Joseph D., Lori Ross O'Neil, Rosalyn M. Leitch, Clifford S. Glantz, Guy P. Landine, Janet L. Bryant, John Lewis, Gemma Mathers, Robert Rodger und Christopher Johnson. Information security management system planning for CBRN facilities. Office of Scientific and Technical Information (OSTI), Dezember 2015. http://dx.doi.org/10.2172/1236335.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Barker, W. C. Guideline for identifying an information system as a national security system. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-59.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Regenscheid, Andrew, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke und Scott Shorter. Information system security best practices for UOCAVA-supporting systems. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7682.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Grance, T., J. Hash und M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-64.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Grance, T., J. Hash und M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-64r1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Brinkman, David A., Kenneth H. Stavenjord und Peter C. Johnson. Information System Security: User Authentication Protection at Central Design Activities. Fort Belvoir, VA: Defense Technical Information Center, Juli 2002. http://dx.doi.org/10.21236/ada405067.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie