Auswahl der wissenschaftlichen Literatur zum Thema „Trust by the way of security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Trust by the way of security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Trust by the way of security"
Hungerford, Thomas. „A Better Way to Invest the Social Security Trust Fund“. Challenge 49, Nr. 3 (Juni 2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Der volle Inhalt der QuelleWang, Haoxiang. „Review on Trust Building Algorithms in IoT Security“. Journal of ISMAC 3, Nr. 4 (19.04.2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Der volle Inhalt der QuelleBräunlich, Katharina, und Rüdiger Grimm. „Development of A Formal Security Model for Electronic Voting Systems“. International Journal of Information Security and Privacy 7, Nr. 2 (April 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Der volle Inhalt der QuelleGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam und Mustafa M. Barakat. „Cloud-Based Global Online Marketplaces Review on Trust and Security“. International Journal of Interactive Mobile Technologies (iJIM) 13, Nr. 04 (10.04.2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Der volle Inhalt der QuelleZhakshylykova, T. A. „Psychological trust in social networks“. Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), Nr. 8 (07.08.2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Der volle Inhalt der QuelleKim, Sangyoung, und Taebok Lee. „Factors affecting information security compliance intention of military officer“. Journal of Advances in Military Studies 5, Nr. 1 (30.04.2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Der volle Inhalt der QuelleCao, Xiao Mei, Hai Tao Zhu, He Yang Shen und Gui Hai Chen. „Proxy-Based Security-Feedback Trust Model in MP2P Network“. Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Der volle Inhalt der QuelleSiriwardana, S. M. D. N. „Hardware Security and Trust: Trends, Challenges, and Design Tools“. International Research Journal of Innovations in Engineering and Technology 08, Nr. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Der volle Inhalt der QuelleKumawat, Shyamlal, und Prof Deepak Tomar. „Trust Models in Cloud Computing - A Perspective“. INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, Nr. 2 (25.10.2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Der volle Inhalt der QuelleSreevidya, B., und Dr M. Supriya. „Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications“. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, Nr. 1 (29.03.2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
Der volle Inhalt der QuelleDissertationen zum Thema "Trust by the way of security"
Urban, Michael Crawford. „Imagined security : collective identification, trust, and the liberal peace“. Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Der volle Inhalt der QuelleManor, Mike. „The home front : civil rights, American values, and public trust when America is at war /“. Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.
Der volle Inhalt der QuelleLemaitre, Freddy. „La monnaie comme objet de sûretés“. Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.
Der volle Inhalt der QuelleAs the law stands, security rights in money are likely to be subject to different legal treatment, depending on whether money is regarded as a tangible asset or as an intangible asset, and depending on whether sums of money as a guarantee are assimilated with the secured creditor’s property or not. Taking this observation as its starting point, the present essay suggests adopting a unified approach of legal nature of money, that is likely to justify that money should be subject to a simplified security regime. Without ignoring that it is bound to be dual, depending on whether sums of money as a guarantee are separated from the secured creditor’s property or not, this security regime would be called upon to replace the present fungible assets, bank account and receivables pledge agreements, and also security trust on receivables and money, with a single money pledge agreement.The rules of the lodging of this money pledge agreement will be designed to eliminate the never-ending debates as to whether the “cash collateral” vests ownership of the encumbered money in the secured creditor, or not. Indeed, the assimilation of the encumbered sums of money with the secured creditor’s property will involve a sui generis division of the ownership rights that will be like an irregular usufruct by way of collateral, and that will grant the creditor neither mere preferential rights, nor ownership rights, nor any right similar to the right of a security trustee, but the right to dispose of money provisionally. This right of disposal will encumber temporarily the ownership rights that will remain in the hands of the grantor of the security.The rules of its lodging being therefore clarified, the rights granted by the money pledge agreement will be enforced more quickly and more effectively since the divided ownership of money will be reconstructed in the hands of the grantor of the security or in the hands of the secured creditor, depending on whether the secured debt will be paid or not, and without there being a need to wonder if the rights granted by the pledge have to be enforced either through judicial or contractual award of the right of ownership, or through legal, judicial or contractual compensation
Gilberg, Ole Rasmus. „Cloud Security without Trust“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.
Der volle Inhalt der QuelleKarthik, Krishna FNU. „Vehicular Security using Trust Management“. OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Der volle Inhalt der QuelleLeonhard, Julian. „Analog hardware security and trust“. Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Der volle Inhalt der QuelleThe ongoing globalization and specialization of the integrated circuit (IC) supply chain has led semiconductor companies to share their valuable intellectual property (IP) assets with numerous parties for means of manufacturing, testing, etc. As a consequence, sensitive IPs and ICs are being exposed to untrusted parties, resulting in serious piracy threats such as counterfeiting or reverse engineering. In this thesis we develop methods to secure analog and mixed signal IPs/ICs from piracy threats within the supply chain. We propose an anti-piracy methodology for locking mixed-signal ICs via logic locking of their digital part. Furthermore, we propose an anti-reverse engineering methodology camouflaging the effective geometry of layout components. Finally, we propose an attack to break all analog circuit locking techniques that act upon the biasing of the circuit. The presented techniques have the potential to protect analog and mixed-signal circuits against a large subset of all the possible risk scenarios while inflicting low overheads in terms of area, power and performance
Bilgic, Ali. „Transcending Europe's immigration security dilemma : security, trust, and hospitality“. Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Der volle Inhalt der QuelleElsalamouny, Ehab M. „Probablistic trust models in network security“. Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.
Der volle Inhalt der QuelleEl, Salamouny Ehab. „Probabilistic trust models in network security“. Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Der volle Inhalt der QuelleMorris, Cameron. „Browser-Based Trust Negotiation“. Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.
Der volle Inhalt der QuelleBücher zum Thema "Trust by the way of security"
Bacevich, A. J. Breach of trust: How Americans failed their soldiers and their country. New York: Metropolitan Books, Henry Holt and Company, 2013.
Den vollen Inhalt der Quelle findenCreating an American lake: United States imperialism and strategic security in the Pacific Basin, 1945-1947. Westport, Conn: Greenwood Press, 2001.
Den vollen Inhalt der Quelle findenBörsch-Supan, Axel. The German public pension system: How it was, how it will be. Cambridge, MA: National Bureau of Economic Research, 2004.
Den vollen Inhalt der Quelle findenBörsch-Supan, Axel. The German public pension system: How it was, how it will be. Cambridge, Mass: National Bureau of Economic Research, 2004.
Den vollen Inhalt der Quelle findenGarbis, Jason, und Jerry W. Chapman. Zero Trust Security. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8.
Der volle Inhalt der QuelleRoman, Rodrigo, und Jianying Zhou, Hrsg. Security and Trust Management. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91859-0.
Der volle Inhalt der QuelleKatsikas, Sokratis K., und Cristina Alcaraz, Hrsg. Security and Trust Management. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01141-3.
Der volle Inhalt der QuelleBarthe, Gilles, Evangelos Markatos und Pierangela Samarati, Hrsg. Security and Trust Management. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2.
Der volle Inhalt der QuelleJøsang, Audun, Pierangela Samarati und Marinella Petrocchi, Hrsg. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4.
Der volle Inhalt der QuelleAccorsi, Rafael, und Silvio Ranise, Hrsg. Security and Trust Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7.
Der volle Inhalt der QuelleBuchteile zum Thema "Trust by the way of security"
Singh, Rajiv Ranjan, José Moreira, Tom Chothia und Mark D. Ryan. „Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties“. In Security and Trust Management, 3–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_1.
Der volle Inhalt der QuelleFischer-Hübner, Simone, und Farzaneh Karegar. „Addressing Challenges: A Way Forward“. In Synthesis Lectures on Information Security, Privacy, and Trust, 133–60. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-54158-2_5.
Der volle Inhalt der QuelleWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, François Barrere und AbdelMalek Benzekri. „Which Web Browsers Process SSL Certificates in a Standardized Way?“ In Emerging Challenges for Security, Privacy and Trust, 432–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_38.
Der volle Inhalt der QuelleGolia, Silvia. „Trust and security in Italy“. In Proceedings e report, 239–44. Florence: Firenze University Press and Genova University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0106-3.42.
Der volle Inhalt der QuelleBonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell und Stephanie Rossello. „Increasing Trust for Data Spaces with Federated Learning“. In Data Spaces, 89–106. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.
Der volle Inhalt der QuelleHarbison, Bill. „Delegating Trust“. In Security Protocols, 108–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49135-x_17.
Der volle Inhalt der QuellePark, Eun G. „Trust in Virtual Communities“. In Information Security and Ethics, 2500–2504. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch165.
Der volle Inhalt der QuelleVashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary und Rajneesh Panwar. „Enhancing Cloud Security“. In Improving Security, Privacy, and Trust in Cloud Computing, 85–112. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.
Der volle Inhalt der QuelleOermann, Andrea, und Jana Dittmann. „Trust in E-Technologies“. In Information Security and Ethics, 3122–32. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch209.
Der volle Inhalt der QuelleMarsh, Stephen, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël und Mehmet Vefa Bicakci. „Foreground Trust as a Security Paradigm“. In Information Security in Diverse Computing Environments, 8–23. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6158-5.ch002.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Trust by the way of security"
Ries, Sebastian, Marc Fischlin, Leonardo A. Martucci und Max Muuhlhauser. „Learning Whom to Trust in a Privacy-Friendly Way“. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.30.
Der volle Inhalt der QuelleFeng, Huan, und Kang G. Shin. „Masquerade of mobile applications: Introducing unlinkability in a practical way“. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906937.
Der volle Inhalt der QuelleHoa, Huynh Van, Chan Dai Truyen Thai, Nguyen Thi Yen Linh und Vo Nguyen Quoc Bao. „Security for Selected Two-Way Relay with Different Trust Degrees and Friendly Jammers“. In 2021 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2021. http://dx.doi.org/10.1109/atc52653.2021.9598201.
Der volle Inhalt der QuelleLy, Stephen, und Yuan Cheng. „A Data-based Protocol for One-way Trust in Inter-vehicular Communication“. In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3445969.3450430.
Der volle Inhalt der QuelleChen, Muqian, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang und Binxing Fang. „Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way“. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00097.
Der volle Inhalt der QuelleLiang, Shan, Yuewu Wang, Lingguang Lei, Jiwu Jing und Quan Zhou. „SecureESFS: Sharing Android External Storage Files in a Securer Way“. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00180.
Der volle Inhalt der QuelleWang, Guozhong, Chunling Peng und Yi Huang. „The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration“. In 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2022. http://dx.doi.org/10.1109/trustcom56396.2022.00019.
Der volle Inhalt der QuelleOwens, Ciaran, und Stephen Brewster. „Discovering and Classifying Errors in Way Finding“. In 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). IEEE, 2011. http://dx.doi.org/10.1109/passat/socialcom.2011.55.
Der volle Inhalt der Quelle„Why Trust is not Proportional to Risk“. In The Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.161.
Der volle Inhalt der QuelleNeville, Stephen W., und Michael Horie. „Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions“. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.85.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Trust by the way of security"
Flagg, Melissa, und Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, Januar 2021. http://dx.doi.org/10.51593/20200051.
Der volle Inhalt der QuelleArtis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow und Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), März 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.
Der volle Inhalt der QuelleArmstrong, Beth, Lucy King, Robin Clifford und Mark Jitlal. Food and You 2 - Wave 2. Food Standards Agency, Juli 2021. http://dx.doi.org/10.46756/sci.fsa.dws750.
Der volle Inhalt der QuelleArmstrong, Beth, Lucy King, Robin Clifford, mark Jitlal, Katie Mears, Charlotte Parnell und Daniel Mensah. Food and You 2: Wave 6 Key Findings. Food Standards Agency, Juli 2023. http://dx.doi.org/10.46756/sci.fsa.djj797.
Der volle Inhalt der QuelleArmstrong, Beth, Lucy King, Robin Clifford, Mark Jitlal, Ayla Ibrahimi Jarchlo, Katie Mears, Charlotte Parnell und Daniel Mensah. Food and You: Wave 5. Food Standards Agency, März 2023. http://dx.doi.org/10.46756/sci.fsa.fqq357.
Der volle Inhalt der QuelleMcFee, Erin. Research Brief: Environmental Peacebuilding with Formerly Armed Actors. Trust After Betrayal, Februar 2024. http://dx.doi.org/10.59498/21970.
Der volle Inhalt der QuelleArmstrong, Beth, Lucy King, Robin Clifford, Mark Jitlal, Katie Mears, Charlotte Parnell und Daniel Mensah. Food and You 2: Wave 7 Key Findings. Food Standards Agency, April 2024. http://dx.doi.org/10.46756/sci.fsa.qqj935.
Der volle Inhalt der QuelleVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, März 2013. http://dx.doi.org/10.18235/0011448.
Der volle Inhalt der QuelleOshio, Takashi. Social Security and Trust Fund Management. Cambridge, MA: National Bureau of Economic Research, April 2004. http://dx.doi.org/10.3386/w10444.
Der volle Inhalt der QuelleSchneider, Fred B., und Greg Morrisett. Trust in Security-Policy Enforcement Mechanisms. Fort Belvoir, VA: Defense Technical Information Center, Februar 2006. http://dx.doi.org/10.21236/ada444727.
Der volle Inhalt der Quelle