Academic literature on the topic 'Security and efficiency of information system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security and efficiency of information system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security and efficiency of information system"

1

Kiedrowicz, Maciej, and Jerzy Stanik. "Method for assessing efficiency of the information security management system." MATEC Web of Conferences 210 (2018): 04011. http://dx.doi.org/10.1051/matecconf/201821004011.

Full text
Abstract:
The article addresses the issue of efficiency assessment of the security system (SS) in terms of the Information Security Management System (information resources of the information system in an organization). It is assumed that the purpose of such security system is to achieve a declared level of protection of the information system resources. Therefore, the level of security of information system in a given organization shall be determined by the efficiency assessment of the security system. The efficiency of the security system mainly depends on the functional properties of its components and other factors occurring in its environment. The article mainly focuses on security configuration, i.e. technical configuration and security organization configuration. The thesis was adopted that the efficiency of the security system may be considered as a set-theoretic efficiency sum of the security configurations invoked in such system. Additionally, it was assumed that a prerequisite for the desired measures (indicators) of the efficiency assessment of the SS shall be to propose such measures and develop appropriate ways (methods) of their calculation. The efficiency measure for the SS as well as two methods of efficiency assessment of the SS were proposed in the article.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Taekyung. "Tourism Information Reservation System considering the Security and Efficiency." Journal of the Korea Society of Digital Industry and Information Management 11, no. 2 (June 30, 2015): 67–72. http://dx.doi.org/10.17662/ksdim.2015.11.2.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zeng, Yi. "Related Research on the Crime of Illegal Invasion into Computer Information System." Advanced Materials Research 1079-1080 (December 2014): 733–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.733.

Full text
Abstract:
The rapid development of information technology makes the construction of computer information system possible, greatly facilitates people’s lives and improves the efficiency of learning and production. Computer information system is also applied in many sensitive areas. To improve the management efficiency of information and data, the behaviors that related computer information systems are illegally invaded are increasingly rampant and have seriously endanger national security, territorial security, sovereignty security, political security, military security, economic security, cultural security, science and technology security, ecological security and information security. In terms of the crime of illegal invasion into computer information system, this paper studies from several aspects, the cognizance of crime and non-crime, the accomplishment and attempt of the crime, subsequent criminal behaviors and legislative perfection.
APA, Harvard, Vancouver, ISO, and other styles
4

Livshits, Ilia, and Pavel Lontsikh. "FORMATION OF METRICS TO MEASURE INFORMATION SECURITY MANAGEMENT SYSTEM EFFICIENCY." Proceedings of Irkutsk State Technical University 112, no. 5 (May 2016): 65–72. http://dx.doi.org/10.21285/1814-3520-2016-5-65-72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dai, Jing Jing, Hui Min Hu, and Qing Cai. "Effectiveness Evaluation of Security System Based on Entropy Theory." Applied Mechanics and Materials 40-41 (November 2010): 806–11. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.806.

Full text
Abstract:
With the security industry developing rapidly and the number of security systems increasing continuously in recent years, security systems provide a positive effect on society security in China, but many of them became vulnerable or even useless because of the problem of irrational allocation of resources. In order to evaluate security system efficiency to avoid these problems, we present the concept of efficiency entropy based on the Shannon information theory, and build an Efficiency Entropy Evaluation Model which can be used to evaluate the efficiency of the security system quantitatively. It represents security system effectiveness in single node layer and the entire security network layers. So the effectiveness of the whole security system is calculated quantitatively.
APA, Harvard, Vancouver, ISO, and other styles
6

Goldobina, Anastasiya, and Valentin Selifanov. "EFFICIENCY EVALUATION OF PROTECTION TOOLS OF STATE INFORMATION SYSTEMS." Interexpo GEO-Siberia 6, no. 1 (2019): 115–21. http://dx.doi.org/10.33764/2618-981x-2019-6-1-115-121.

Full text
Abstract:
Protection components of state information system represent the uniform mechanism capable to protect confidential information. If one of protection elements does not work effectively, it will become a problem for the entire information security system. Public information systems need to take into account all available ways to prevent information leakage, for this, operators should evaluate the efficiency. This article proposes possible solutions of the problem.
APA, Harvard, Vancouver, ISO, and other styles
7

Lajevskis, Vladimirs, Pjotrs Dorogovs, and Andrejs Romanovs. "It Security System Development for State Institution." Scientific Journal of Riga Technical University. Computer Sciences 39, no. 1 (January 1, 2009): 27–32. http://dx.doi.org/10.2478/v10143-010-0003-0.

Full text
Abstract:
It Security System Development for State Institution Nowadays the work efficiency and proficiency of public and private sector substantially depend on information technologies. In connection with the large volume of information stored in automated systems throughout the public sector, special attention should be paid to information security and security of actives. The main goals and tasks of information security, frameworks of IT security system are defined and analyzed in the paper; the standard of IT security system development is investigated, as well as international standards significance and guidance application within the development of IT security system. On the bases of research, the features of the State institutions are defined, which are necessary to take into consideration during the development of IT security system. The primary tasks of IT security system development are emphasized and the technique of development of IT security systems for State institutions is worked out.
APA, Harvard, Vancouver, ISO, and other styles
8

Suhanov, Valeriy, and Oleg Lankin. "Methodology of logical design of information support for distributed information systems of critical application." Modeling of systems and processes 14, no. 3 (September 22, 2021): 67–73. http://dx.doi.org/10.12737/2219-0767-2021-14-3-67-73.

Full text
Abstract:
One of the most promising new information technologies is analytical databases that allow us to analyze the dynamics of the behavior of the control object in the historical aspect. The introduction of analytical databases increases the efficiency of information systems. In particular, one of the criteria for effectiveness is the security of an information system, on which analytical databases have a fairly significant impact, which at first glance is not obvious. In the material of this article, the problems of organizing and implementing security in analytical databases will be considered, as well as the method of logical design of information support for distributed information systems of critical application under the prism of ensuring the security of this system.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Dong Ming, and Kai Feng Zhu. "Network Security Isolation System Based on Information Filtering." Applied Mechanics and Materials 707 (December 2014): 458–61. http://dx.doi.org/10.4028/www.scientific.net/amm.707.458.

Full text
Abstract:
Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.
APA, Harvard, Vancouver, ISO, and other styles
10

Klenin, Dmitriy, and Elena Maksimova. "The Model of Intrusion into the Information System." NBI Technologies, no. 3 (January 2019): 19–23. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.3.

Full text
Abstract:
Categories ‘attack’, ‘intrusion’ and ‘incident’ of information security are defined. The types of intrusions into the information system are revealed, and their brief analysis is given. The proposed model of intrusion into the information system will allow to increase its efficiency at almost all stages of the information security system life cycle. The use of the proposed model is associated with the solution of specific practical problems in the field of information security, including the definition of vulnerabilities of the information system. The latter, in turn, is necessary to determine the elements of the protection system. For example, at the design stage of the information security system, when choosing software protection you need to take into account the location of the intruder relative to the attacked object. When working with functioning systems of information protection, i.e. at the solution of questions of modernization or optimization, changes in the system of information security are resolved in accordance with statistical data for the intrusion into the information system with available results of information security incidents, with the forecast data. Thus, the proposed model of intrusion into the information system is one of the external conditions when working with the information system of the organization (enterprise) may well determine (set) the level of risk of information security of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security and efficiency of information system"

1

Vránová, Nikola. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223423.

Full text
Abstract:
This thesis focuses on the analysis of current information system of the selected points to its possible shortcomings and errors. Information obtained from the analyzes will lead to appropriate solutions to problems. The aim of the current system is customized to meet the needs of its users, so that the information system should be flexible, intuitive and clear
APA, Harvard, Vancouver, ISO, and other styles
2

Parolek, Pavel. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223500.

Full text
Abstract:
My thesis focuses on information system analysis of local municipalities, specifically on Břeclav Municipal Office information system. My thesis evaulates the information system's efficiency, identifies its weak points and suggests measures eliminating these weak points.
APA, Harvard, Vancouver, ISO, and other styles
3

Urban, Petr. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223610.

Full text
Abstract:
This thesis is focused on the information systems; it describes the available innovations applied on the established information systems. It describes the methods that are suitable for testing the effectiveness of the information systems. The practical part includes the current state of the chosen information system of a company, further it tests the effectiveness of the information system and finally it evaluates the received information and recommends the possible changes that would lead to the higher effectiveness of the work of the information system.
APA, Harvard, Vancouver, ISO, and other styles
4

Kůgel, Roman. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2012. http://www.nusl.cz/ntk/nusl-223433.

Full text
Abstract:
This master thesis is aimed at information systems and a correct method of their selection. The theoretical part introduces the dilemma within information systems especially description types of the systems and their examination and selection. An own solution consists of information strategy determination and the selection of convenient information system.
APA, Harvard, Vancouver, ISO, and other styles
5

Cherynová, Nikol. "Posouzení informačního systému společnosti a návrh změn." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402607.

Full text
Abstract:
The diploma thesis „Assessment of a Company's Information System and Proposal for Modifications” deals with the issue of security and efficiency of the information system. The thesis is divided into three parts. The first theoretical part explains the basic concepts that are subsequently used in the thesis. The second part contains analytical starting points and introduction of the company, its analysis and analysis of the information system. This information is the basis for the last proposal part, where its content is to increase the security of the company's information system. Part of the proposal also includes an economic assessment, where benefits and costs are described. The work is elaborated in order to achieve the assigned goal of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
6

Karlsson, Daniel. "Modelling and Analysis of Swedish Heavy Industry Supply Chain Data Management to Improve Efficiency and Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291230.

Full text
Abstract:
Product certificates are sent throughout the supply chain of Swedish heavy industry in order to show provenance and physical characteristics of objects such as screws. The data management of the certificates has been, and still is, a very manual process. The process requires extensive work in order to maintain a correct record of the certificates. In particular, tracing causes of errors and establishing compliance takes a long time and effort. The company Chaintraced is developing an application to automate the process by acting as a third party to digitalize and manage the certificates. Introducing a third party into a business-to-business process requires that data integrity is preserved and that information reaches its expected destination. Recent research has indicated that distributed ledger technologies showpromise to fulfill these requirements. In particular, blockchain-based systems offer immutability and traceability of data, and can reduce the trust needed between different parties by relying on cryptographic primitives and consensus mechanisms. This thesis investigates the application of distributed ledger technology to further automate the Swedish heavy industry supply chain and reduce the trust needed in a third party managing the certificates. Requirements for an industrial strength system is set up and several distributed ledger technology solutions are considered to fit the use case of Swedish heavy industry. A proof of concept based on the findings is implemented, tested and compared with a centralized database to explore its possible usage in the supply chain with regard to feasibility, immutability, traceability and security. The investigation resulted in a prototype based on Hyperledger Fabric to store product certificates. The solution provides certain guarantees to immutability and security while being developed with feasibility for deployment in mind. The proposed solution is shown to be slow compared to a centralized solution but scales linearly with number of certificates and is considered within bounds for the use case. The results also show that the proposed solution is more trustworthy than a centralized solution, but that adopting blockchain technology is an extensive task. In particular, trustworthiness and guarantees provided by the solution is highly dependent on the feasibility aspect and the investigation concludes that adoption of blockchain technology within the Swedish heavy industry must take this into consideration.
Hanteringen av produktcertifikat inom den svenska tungindustrin är en mycket manuell process vilket resulterar i att ett enormt arbete krävs för att upprätthålla en korrekt hantering av certifikaten. Att spåra orsaken till fel och att kontrollera efterlevnaden av krav inom industrin tar lång tid. Chaintraced har utvecklat en applikation som automatiserar hanteringen av certifikaten genom digitalisering och att som tredje part lagra informationen. Att introducera en tredje part i affärsverksamheter kräver att integriteten av datan bibehålls och att information anländer till korrekt mottagare. Ny forskning har visat att distribuerade liggare har möjligheten att uppfylla dessa krav. Framförallt gällande blockkedjetekniken med dess många egenskaper och garantier som företag letar efter, så som oföränderlig och spårbar data. Blockkedjetekniken reducerar också förtroendet som behövs för parter inom nätverket genom att förlita sig på kryptografi och konsensus mekanismer. Den här rapporten utreder användningen av distribuerade liggare för att ytterliggare automatisera den svenska tungindustrins leveranskedja och minska tilliten som krävs för en tredje part som hanterar certifikaten. Krav ställs upp för ett system och flertalet distribuerade databastekniker undersöks för att passa in i fallet angående den svenska tungindustrin. En prototyp är utvecklad baserad på kraven, prototypen är testad och jämförd med en central databas för att undersöka hur implementationen står sig vad gäller genomförbarhet, oföränderlighet, spårbarhet och säkerhet. Undersökningen resulterade i en prototyp baserad på Hyperledger Fabric. Prototypen lagrar produktcertifikaten och ger vissa garantier till oföränderligbarhet samt säkerhet. Möjligheten för aktörer i kedjan att använda prototypen hade stor inverkan på hur systemet utvecklades. Prototypen visar sig vara långsammare än en centraliserad lösning men mätningarna kan anses vara inom kraven för ett system inom tungindustrins leveranskedja. Skalbarheten av lösningen är beroende av kraven på säkerhet men är linjär i antalet certifikat som skickas och lagras. Resultaten visar också att den föreslagna lösningen inger mer tillit än en centraliserad lösning men att introducera blockkedjetekniken är en komplex process. Trovärdighet och garantier som ges av lösningen är till stor del beroende av komplexiteten vilket rapporten kommer fram till är det viktigaste för svensk tungindustri att ha i åtanke vid eventuell antagande av blockkedjeteknik.
APA, Harvard, Vancouver, ISO, and other styles
7

Malá, Eva. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223882.

Full text
Abstract:
This thesis deals with the assessment of information systems of the selected company and proposals for amendments of it. The content of the first part is the explanation of basic terms used in this field. The thesis also analyzes the current status of the infor-mation system and the assessment of its efficiency. Based on the evaluation of the anal-ysis the individual solutions for improving the current state of the information system of the company in terms of balance and efficiency are proposed.
APA, Harvard, Vancouver, ISO, and other styles
8

Igbonagwam, Okey Azu. "The Role of Security Clearance, Users' Involvement, and Computer Self-Efficacy in the Efficiency of Requirements-Gathering Process: An Information-Systems Case Study in the U.S. Military." NSUWorks, 2008. http://nsuworks.nova.edu/gscis_etd/184.

Full text
Abstract:
The central research problem of this study was the challenges that occur with the United States Joint Warfighters Center's (JWFC) implementation of information systems (IS) requirements-gathering process. Thus, this study investigated the contribution of perceived security clearance (PSC), developer perceived user involvement (DPUI), and computer self-efficacy (CSE) to efficiency of the perceived requirements-gathering process (PERGP). Due to the perceived efficiency of IS development, the U.S. Department of Defense statutory document called the Joint Capability Integration and Development System (JCIDS), mandated that as an IS development requirement, the rapid development of IS was needed to sustain U.S. warfighters. As a result, the central aim of this study was to look at several variables that may predict the efficiency to the IS requirements-gathering process at JWFC. The central research question behind this study was: What are the contributions of PSC, DPUI, and CSE to the PERGP at the JWFC? This study proposed a theoretical model, and two statistical methods were used to formulate models and test predictive power: Multiple Linear Regression (MLR) and Ordinal Logistic Regression (OLR). The sample size of this study included 61 IS developers from JWFC. The results of this study indicated a strong reliability for the measures of all variables (PSC, DPUI, CSE, and PERGP). Moreover, results of both models developed indicated that DPUI is a significant contributor to PEGRP, while CSE was demonstrated to be significant contributor to PEGRP only via the OLR model providing the indication that the relationships among the measured variables was non-linear. Additionally, results demonstrated that DPUI was the most significant contributor to PEGRP in both models, while PSC had little or no contribution to the dependent variable, PEGRP. This study also identified two key implications for practice and research. The first impaction of this study is the investigation of unique factors such as PSC and PEGRP in the context of military-based IS development within DOD organizations. Results of this study can help managers in government organizations that are faced with security clearance issues to identify contributors in the early phase of IS development that could possibly hinder PEGRP. The second implication of this study is the non-significant results related to PSC in this investigation. For researchers, such results may need future validation in other governmental and military-based organization. Moreover, such results may indicate to managers in government organizations that are faced with security clearance issues that security clearance, at least as indicated by the results of this study, has no major hindering on the PEGRP. These results maybe profound in their implications and, as such, needed additional validations.
APA, Harvard, Vancouver, ISO, and other styles
9

Kouřil, Martin. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223283.

Full text
Abstract:
This master thesis is aimed at information systems and a correct method of their selection. The theoretical part introduces the dilemma within information systems, ERP systems, their examination and selection. Fisrtly there are some analyses of the existing system operating in company and after that follows own solution which consists of information strategy determination and the selection of convenient information system.
APA, Harvard, Vancouver, ISO, and other styles
10

Černín, Ondřej. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318316.

Full text
Abstract:
The master thesis is focused on the assessment of the company information system and the proposal for changes. Primarily, the thesis focuses on adding new module Wages and Human Resources to existing information system. As the second part of the implemented change, proposals are presented in the work to improve the current situation in the field of information security.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security and efficiency of information system"

1

Examining challenges and wasted taxpayer dollars in modernizing border security IT systems: Hearing before the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, February 6, 2014. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dhillon, Gurpreet. Managing Information System Security. London: Macmillan Education UK, 1997. http://dx.doi.org/10.1007/978-1-349-14454-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

International Institute for Educational Planning., ed. An efficiency-based management information system. Paris: Unesco, International Institute for Educational Planning, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Atkins, Cathy. Protecting water system security information. Denver, Colo: National Conference of State Legislatures, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

NHS Management Executive. Information Management Group. Information system security and you. London: Department of Health, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Information security: Advances and remaining challenges to adoption of public key infrastructure technology : report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Swanson, Marianne. Security self-assessment guide for information technology system. Gaithersburg, MD: U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Division, Montana Legislature Legislative Audit. Information processing facility and central applications: Information system audit. Helena, Mont: Legislative Audit Division, State of Montana, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Security for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security and efficiency of information system"

1

Liu, Weiwei, Yi Mu, and Guomin Yang. "An Efficient Privacy-Preserving E-coupon System." In Information Security and Cryptology, 3–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16745-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Zibin, Lijun Wei, Jing Wu, and Chengnian Long. "A Blockchain-Based Digital Copyright Protection System with Security and Efficiency." In Communications in Computer and Information Science, 34–49. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6478-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin, Haimin, Duncan S. Wong, and Yinlong Xu. "An Efficient Password-Only Two-Server Authenticated Key Exchange System." In Information and Communications Security, 44–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77048-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marcu, Marius, and Dacian Tudor. "Energy Efficiency Measurements of Mobile Virtualization Systems." In Security and Privacy in Mobile Information and Communication Systems, 88–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Badrinath, G. S., Aditya Nigam, and Phalguni Gupta. "An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores." In Information and Communications Security, 374–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Niemann, Raik, Nikolaos Korfiatis, Roberto Zicari, and Richard Göbel. "Evaluating the Energy Efficiency of OLTP Operations." In Availability, Reliability, and Security in Information Systems and HCI, 28–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40511-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wei, Zhuo, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng, and Robert H. Deng. "IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)." In Information Security Practice and Experience, 638–47. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sadiah, Shahidatul, Toru Nakanishi, and Nobuo Funabiki. "Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes." In Advances in Information and Computer Security, 262–78. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22425-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Kijeong, Byungjoo Park, and Gil-Cheol Park. "Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN." In Communications in Computer and Information Science, 64–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13365-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barreno, F., M. Santos, and M. Romana. "Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 94–104. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security and efficiency of information system"

1

Erulanova, Aizhan, Gulzhan Soltan, Aizhan Baidildina, Marzhan Amangeldina, and Askhat Aset. "Expert System for Assessing the Efficiency of Information Security." In 2020 7th International Conference on Electrical and Electronics Engineering (ICEEE). IEEE, 2020. http://dx.doi.org/10.1109/iceee49618.2020.9102555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hentea, Mariana. "Intelligent System for Information Security Management: Architecture and Design Issues." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3055.

Full text
Abstract:
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computing systems based on intelligent techniques that support continuous monitoring and controlling plant activities. Intelligence improves an individual’s ability to make better decisions. This paper presents a proposed architecture of an Intelligent System for Information Security Management (ISISM). The objective of this system is to improve security management processes such as monitoring, controlling, and decision making with an effect size that is higher than an expert in security by providing mechanisms to enhance the active construction of knowledge about threats, policies, procedures, and risks. We focus on requirements and design issues for the basic components of the intelligent system.
APA, Harvard, Vancouver, ISO, and other styles
3

Jiao, Teng, Kun Zhang, Wen Zhang, and Xiuzhen Dong. "Improve Communication Efficiency for the Physiological Information Monitor System Based on Zigbee." In 2009 Second International Symposium on Intelligent Information Technology and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/iitsi.2009.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bai, Zhu-Lan, and Bing Cai. "Effect of E-Government on the Efficiency of Information Service." In 2009 International Conference on E-Business and Information System Security (EBISS). IEEE, 2009. http://dx.doi.org/10.1109/ebiss.2009.5137970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Jeom-Goo. "The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement." In 2008 International Conference on Information Science and Security (ICISS 2008). IEEE, 2008. http://dx.doi.org/10.1109/iciss.2008.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Drozdov, Nikita A., Julia A. Tagiltseva, Marina A. Vasilenko, and Elena L. Kuzina. "Modeling of efficiency assessment for enterprises economic activity in environmental system." In 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2017. http://dx.doi.org/10.1109/itmqis.2017.8085926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goncharov, Nikita, Alexander Dushkin, and Igor Goncharov. "Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences." In 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA). IEEE, 2019. http://dx.doi.org/10.1109/summa48161.2019.8947513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sever, Dubravko, and Tonimir Kisasondi. "Efficiency and security of docker based honeypot systems." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aniskina, Nina N., and Anastasiia M. Kantsulina. "An Approach to the Establishment of an Automated Energy Efficiency Improvement System." In 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2019. http://dx.doi.org/10.1109/itqmis.2019.8928362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goryunova, V. V., T. I. Goryunova, and Y. V. Molodtsova. "Integration and Security of Corporate Information Systems in the Context of Industrial Digitalization." In 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA). IEEE, 2020. http://dx.doi.org/10.1109/summa50634.2020.9280663.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security and efficiency of information system"

1

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada407864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lane, Brendan F., and Joseph Johnson. High Security Information System. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada418505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Roback, Edward. Automated information system security accreditation guidelines. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skormin, Victor A. Biological Approach to System Information Security (BASIS). Fort Belvoir, VA: Defense Technical Information Center, December 2003. http://dx.doi.org/10.21236/ada420842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lenaeu, Joseph D., Lori Ross O'Neil, Rosalyn M. Leitch, Clifford S. Glantz, Guy P. Landine, Janet L. Bryant, John Lewis, Gemma Mathers, Robert Rodger, and Christopher Johnson. Information security management system planning for CBRN facilities. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1236335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barker, W. C. Guideline for identifying an information system as a national security system. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Regenscheid, Andrew, Geoff Beier, Santosh Chokhani, Paul Hoffman, Jim Knoke, and Scott Shorter. Information system security best practices for UOCAVA-supporting systems. Gaithersburg, MD: National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grance, T., J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grance, T., J. Hash, and M. Stevens. Security considerations in the information system development life cycle. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.sp.800-64r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brinkman, David A., Kenneth H. Stavenjord, and Peter C. Johnson. Information System Security: User Authentication Protection at Central Design Activities. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada405067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography