Academic literature on the topic 'Security and efficiency of information system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security and efficiency of information system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security and efficiency of information system"
Kiedrowicz, Maciej, and Jerzy Stanik. "Method for assessing efficiency of the information security management system." MATEC Web of Conferences 210 (2018): 04011. http://dx.doi.org/10.1051/matecconf/201821004011.
Full textKim, Taekyung. "Tourism Information Reservation System considering the Security and Efficiency." Journal of the Korea Society of Digital Industry and Information Management 11, no. 2 (June 30, 2015): 67–72. http://dx.doi.org/10.17662/ksdim.2015.11.2.067.
Full textZeng, Yi. "Related Research on the Crime of Illegal Invasion into Computer Information System." Advanced Materials Research 1079-1080 (December 2014): 733–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.733.
Full textLivshits, Ilia, and Pavel Lontsikh. "FORMATION OF METRICS TO MEASURE INFORMATION SECURITY MANAGEMENT SYSTEM EFFICIENCY." Proceedings of Irkutsk State Technical University 112, no. 5 (May 2016): 65–72. http://dx.doi.org/10.21285/1814-3520-2016-5-65-72.
Full textDai, Jing Jing, Hui Min Hu, and Qing Cai. "Effectiveness Evaluation of Security System Based on Entropy Theory." Applied Mechanics and Materials 40-41 (November 2010): 806–11. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.806.
Full textGoldobina, Anastasiya, and Valentin Selifanov. "EFFICIENCY EVALUATION OF PROTECTION TOOLS OF STATE INFORMATION SYSTEMS." Interexpo GEO-Siberia 6, no. 1 (2019): 115–21. http://dx.doi.org/10.33764/2618-981x-2019-6-1-115-121.
Full textLajevskis, Vladimirs, Pjotrs Dorogovs, and Andrejs Romanovs. "It Security System Development for State Institution." Scientific Journal of Riga Technical University. Computer Sciences 39, no. 1 (January 1, 2009): 27–32. http://dx.doi.org/10.2478/v10143-010-0003-0.
Full textSuhanov, Valeriy, and Oleg Lankin. "Methodology of logical design of information support for distributed information systems of critical application." Modeling of systems and processes 14, no. 3 (September 22, 2021): 67–73. http://dx.doi.org/10.12737/2219-0767-2021-14-3-67-73.
Full textZhao, Dong Ming, and Kai Feng Zhu. "Network Security Isolation System Based on Information Filtering." Applied Mechanics and Materials 707 (December 2014): 458–61. http://dx.doi.org/10.4028/www.scientific.net/amm.707.458.
Full textKlenin, Dmitriy, and Elena Maksimova. "The Model of Intrusion into the Information System." NBI Technologies, no. 3 (January 2019): 19–23. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.3.
Full textDissertations / Theses on the topic "Security and efficiency of information system"
Vránová, Nikola. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223423.
Full textParolek, Pavel. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223500.
Full textUrban, Petr. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223610.
Full textKůgel, Roman. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223433.
Full textCherynová, Nikol. "Posouzení informačního systému společnosti a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402607.
Full textKarlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.
Full textHanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
Malá, Eva. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223882.
Full textIgbonagwam, Okey Azu. "The Role of Security Clearance, Users' Involvement, and Computer Self-Efficacy in the Efficiency of Requirements-Gathering Process: An Information-Systems Case Study in the U.S. Military." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/184.
Full textKouřil, Martin. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223283.
Full textČernín, Ondřej. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318316.
Full textBooks on the topic "Security and efficiency of information system"
Examining challenges and wasted taxpayer dollars in modernizing border security IT systems: Hearing before the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, February 6, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textDhillon, Gurpreet. Managing Information System Security. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9.
Full textInternational Institute for Educational Planning., ed. An efficiency-based management information system. Paris: Unesco, International Institute for Educational Planning, 1993.
Find full textAtkins, Cathy. Protecting water system security information. Denver, Colo: National Conference of State Legislatures, 2003.
Find full textNHS Management Executive. Information Management Group. Information system security and you. London: Department of Health, 1992.
Find full textOffice, General Accounting. Information security: Advances and remaining challenges to adoption of public key infrastructure technology : report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2001.
Find full textChopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.
Full textSwanson, Marianne. Security self-assessment guide for information technology system. Gaithersburg, MD: U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001.
Find full textDivision, Montana Legislature Legislative Audit. Information processing facility and central applications: Information system audit. Helena, Mont: Legislative Audit Division, State of Montana, 1999.
Find full textSecurity for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.
Find full textBook chapters on the topic "Security and efficiency of information system"
Liu, Weiwei, Yi Mu, and Guomin Yang. "An Efficient Privacy-Preserving E-coupon System." In Information Security and Cryptology, 3–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16745-9_1.
Full textXu, Zibin, Lijun Wei, Jing Wu, and Chengnian Long. "A Blockchain-Based Digital Copyright Protection System with Security and Efficiency." In Communications in Computer and Information Science, 34–49. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6478-3_3.
Full textJin, Haimin, Duncan S. Wong, and Yinlong Xu. "An Efficient Password-Only Two-Server Authenticated Key Exchange System." In Information and Communications Security, 44–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77048-0_4.
Full textMarcu, Marius, and Dacian Tudor. "Energy Efficiency Measurements of Mobile Virtualization Systems." In Security and Privacy in Mobile Information and Communication Systems, 88–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_8.
Full textBadrinath, G. S., Aditya Nigam, and Phalguni Gupta. "An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores." In Information and Communications Security, 374–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_30.
Full textNiemann, Raik, Nikolaos Korfiatis, Roberto Zicari, and Richard Göbel. "Evaluating the Energy Efficiency of OLTP Operations." In Availability, Reliability, and Security in Information Systems and HCI, 28–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_3.
Full textWei, Zhuo, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng, and Robert H. Deng. "IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)." In Information Security Practice and Experience, 638–47. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_39.
Full textSadiah, Shahidatul, Toru Nakanishi, and Nobuo Funabiki. "Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes." In Advances in Information and Computer Security, 262–78. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_16.
Full textLee, Kijeong, Byungjoo Park, and Gil-Cheol Park. "Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN." In Communications in Computer and Information Science, 64–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_7.
Full textBarreno, F., M. Santos, and M. Romana. "Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 94–104. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_10.
Full textConference papers on the topic "Security and efficiency of information system"
Erulanova, Aizhan, Gulzhan Soltan, Aizhan Baidildina, Marzhan Amangeldina, and Askhat Aset. "Expert System for Assessing the Efficiency of Information Security." In 2020 7th International Conference on Electrical and Electronics Engineering (ICEEE). IEEE, 2020. http://dx.doi.org/10.1109/iceee49618.2020.9102555.
Full textHentea, Mariana. "Intelligent System for Information Security Management: Architecture and Design Issues." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3055.
Full textJiao, Teng, Kun Zhang, Wen Zhang, and Xiuzhen Dong. "Improve Communication Efficiency for the Physiological Information Monitor System Based on Zigbee." In 2009 Second International Symposium on Intelligent Information Technology and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/iitsi.2009.46.
Full textBai, Zhu-Lan, and Bing Cai. "Effect of E-Government on the Efficiency of Information Service." In 2009 International Conference on E-Business and Information System Security (EBISS). IEEE, 2009. http://dx.doi.org/10.1109/ebiss.2009.5137970.
Full textKim, Jeom-Goo. "The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement." In 2008 International Conference on Information Science and Security (ICISS 2008). IEEE, 2008. http://dx.doi.org/10.1109/iciss.2008.38.
Full textDrozdov, Nikita A., Julia A. Tagiltseva, Marina A. Vasilenko, and Elena L. Kuzina. "Modeling of efficiency assessment for enterprises economic activity in environmental system." In 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2017. http://dx.doi.org/10.1109/itmqis.2017.8085926.
Full textGoncharov, Nikita, Alexander Dushkin, and Igor Goncharov. "Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences." In 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA). IEEE, 2019. http://dx.doi.org/10.1109/summa48161.2019.8947513.
Full textSever, Dubravko, and Tonimir Kisasondi. "Efficiency and security of docker based honeypot systems." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400212.
Full textAniskina, Nina N., and Anastasiia M. Kantsulina. "An Approach to the Establishment of an Automated Energy Efficiency Improvement System." In 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2019. http://dx.doi.org/10.1109/itqmis.2019.8928362.
Full textGoryunova, V. V., T. I. Goryunova, and Y. V. Molodtsova. "Integration and Security of Corporate Information Systems in the Context of Industrial Digitalization." In 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA). IEEE, 2020. http://dx.doi.org/10.1109/summa50634.2020.9280663.
Full textReports on the topic "Security and efficiency of information system"
Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.
Full textLane, Brendan F., and Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada418505.
Full textRoback, Edward. Automated information system security accreditation guidelines. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4378.
Full textSkormin, Victor A. Biological Approach to System Information Security (BASIS). Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada420842.
Full textLenaeu, Joseph D., Lori Ross O'Neil, Rosalyn M. Leitch, Clifford S. Glantz, Guy P. Landine, Janet L. Bryant, John Lewis, Gemma Mathers, Robert Rodger, and Christopher Johnson. Information security management system planning for CBRN facilities. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1236335.
Full textBarker, W. C. Guideline for identifying an information system as a national security system. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-59.
Full textRegenscheid, Andrew, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke, and Scott Shorter. Information system security best practices for UOCAVA-supporting systems. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7682.
Full textGrance, T., J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-64.
Full textGrance, T., J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-64r1.
Full textBrinkman, David A., Kenneth H. Stavenjord, and Peter C. Johnson. Information System Security: User Authentication Protection at Central Design Activities. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada405067.
Full text