Artículos de revistas sobre el tema "Security challenge"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Security challenge.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security challenge".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Streater, K. "Cyber Security Challenge". ITNOW 52, n.º 6 (1 de noviembre de 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Waugh, William L. "Securing Mass Transit: A Challenge for Homeland Security". Review of Policy Research 21, n.º 3 (mayo de 2004): 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Fair, C. Christine. "Pakistan's Security-Governance Challenge". Current History 110, n.º 735 (1 de abril de 2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Szönyi, István. "Hungary: A security challenge?" International Spectator 29, n.º 1 (enero de 1994): 89–108. http://dx.doi.org/10.1080/03932729408458041.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kurpjuhn, Thorsten. "The SME security challenge". Computer Fraud & Security 2015, n.º 3 (marzo de 2015): 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Beysenov, B. K. y A. Igisenova. "Global challenge and spiritual security". Eurasian Journal of Religious studies 2, n.º 2 (2015): 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

McCluskey, B. "Connected cars - the security challenge". Engineering & Technology 12, n.º 2 (1 de marzo de 2017): 54–57. http://dx.doi.org/10.1049/et.2017.0205.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Carroll, John E. "The Acid Challenge to Security". Bulletin of the Atomic Scientists 45, n.º 8 (octubre de 1989): 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Lafuente, Guillermo. "The big data security challenge". Network Security 2015, n.º 1 (enero de 2015): 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

EMBER, LOIS. "Diseases Pose National Security Challenge". Chemical & Engineering News 78, n.º 11 (13 de marzo de 2000): 10. http://dx.doi.org/10.1021/cen-v078n011.p010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Hoving, Per. "System security: The technical challenge". Computers & Security 5, n.º 1 (marzo de 1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Farrant, Alex. "5G and the Security Challenge". New Electronics 51, n.º 20 (12 de noviembre de 2019): 27–28. http://dx.doi.org/10.12968/s0047-9624(22)61484-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Nelson, Margaret C., Scott E. Ingram, Andrew J. Dugmore, Richard Streeter, Matthew A. Peeples, Thomas H. McGovern, Michelle Hegmon et al. "Climate challenges, vulnerabilities, and food security". Proceedings of the National Academy of Sciences 113, n.º 2 (28 de diciembre de 2015): 298–303. http://dx.doi.org/10.1073/pnas.1506494113.

Texto completo
Resumen
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Dhakal, Bikash. "Assessing geopolitics as Nepal's national security challenge". Unity Journal 1 (1 de febrero de 2020): 14–20. http://dx.doi.org/10.3126/unityj.v1i0.35690.

Texto completo
Resumen
The increased geo-strategic interests and concerns of great powers have posed serious challenges to national security of Nepal. This article objectively analyzes the impacts of geopolitics on Nepal's national security. It intends to examine the National security within the framework of geopolitical rivalry. Geopolitics is rather a crucial external factor than the other internal factors of insecurity. Thus, this article attempts to justify how regional and global geopolitical developments challenge Nepal's national security. This article explains geopolitical factors that can pose threat and challenge to national security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Patankar, Manoj S. y Louis Holscher. "Accessibility vs Security: The Challenge to Airport Security Systems". Security Journal 13, n.º 2 (abril de 2000): 7–19. http://dx.doi.org/10.1057/palgrave.sj.8340046.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Cîrdei, Ionuț Alin y Lucian Ispas. "Challenges to European and Euro-Atlantic Security". International conference KNOWLEDGE-BASED ORGANIZATION 28, n.º 1 (1 de junio de 2022): 7–14. http://dx.doi.org/10.2478/kbo-2022-0002.

Texto completo
Resumen
Abstract The current security environment is characterized by uncertainty and multiple transformations in all areas. Mankind as a whole enjoys an extremely favorable context and an indisputable climate of security. However, security challenges are becoming more and more difficult to anticipate. The last few years have brought a new pandemic challenge to all states, which has put all systems to the test. In addition to the pandemic challenge, European and Euro-Atlantic countries face a military challenge that has the potential to directly affect regional and global security and cause shock waves in all areas, especially in the economic, political, diplomatic and military field. To these major challenges are added the challenges that have now faded into the background, such as climate change, the impact of natural disasters, organized crime, terrorism, and so on. In order to meet these new challenges, the European and Euro-Atlantic states must demonstrate cohesion and determination and take effective and decisive action to protect their interests and ensure the security and stability of their allies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Dynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler". National Security Journal 1, n.º 1 (octubre de 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Texto completo
Resumen
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy". American Journal of Health Sciences (AJHS) 3, n.º 2 (2 de abril de 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Texto completo
Resumen
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Riaz, Naveed, Ayesha Riaz y Sajid Ali Khan. "Biometric template security: an overview". Sensor Review 38, n.º 1 (15 de enero de 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Texto completo
Resumen
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Taranenko, Anna. "THE EU MIGRATION CRISIS AS A CHALLENGE TO EUROPEAN REGIONAL SECURITY". Politology bulletin, n.º 86 (2021): 210–24. http://dx.doi.org/10.17721/2415-881x.2021.86.210-224.

Texto completo
Resumen
The EU migration crisis is analyzed as a challenge to European regional security. The used method is historical and comparative. As a result, it can be stated that migration is a global trend which has become especially dynamic in the second half of the 20th. Dynamic migration processes, in their turn, stipulate the importance of efficient ethnic policy of recipient states. Since 2015 the European Union authorities took measures in order respond to the migration crisis effectively, strengthen regional security and enhance borders control. The EU makes further efforts in order strengthen intersectoral cooperation between various political and security agencies responsible for tackling the migration crisis. To a certain extent, the migration crisis of 2015 posed a threat to the European Union unity and security and also raises questions about further integration of the European Union. The migration crisis has demonstrated that the EU needs to efficiently adapt its security strategy to new challenges. It can be concluded that the current migration crisis processes in the EU challenge further European integration and regional European security. Core democratic values have been challenged by the migration crisis, in particular, freedom of movement and civil protection and in order to enhance regional security in Europe one can further utilize the civil society potential and track-II diplomacy instruments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh y Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks". International Journal of Applied Metaheuristic Computing 10, n.º 4 (octubre de 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Texto completo
Resumen
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

LemaîTre, Pierre. "The Gorbachev challenge and European security". International Affairs 65, n.º 2 (1989): 357–58. http://dx.doi.org/10.2307/2622134.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Pervez, Laiba, Aiza Khan y Noor ul Ain. "Cyber Security Challenge in an Automobile". International Journal of Scientific and Research Publications (IJSRP) 10, n.º 12 (6 de diciembre de 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Lakušić, Milovan y Sofija Lolić. "Terrorism as a contemporary security challenge". Megatrend revija 18, n.º 4 (2021): 389–400. http://dx.doi.org/10.5937/megrev2104389l.

Texto completo
Resumen
Terrorism is one of the greatest challenges to modern security. In this paper, we try to explain how terrorism is regulated in the legislation of the Republic of Serbia and how and in what way it affects the security of the Republic of Serbia and surrounding countries. Starting with the AP of Kosovo and Metohija, where terrorism appears in the 1990s in the idea of creating a "Greater Albania". Terrorism as a phenomenon is based on the use of violence and an ideology that is religiously, racially or ethnically firmly determined. Terrorism as a crime in our legislation is one of the most serious crimes classified in the category of crimes against humanity and other goods protected internationally. What is considered a problem in the fight against terrorism is that even today there is no generally accepted understanding of what terrorism really is? This phenomenon, which is already gaining momentum today, is constantly advancing in every sense, and it is necessary to start finding a path that leads to controlling this phenomenon. By violating human rights and other material goods, terrorism threatens the global order.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Ezemenaka, Kingsley Emeka. "KIDNAPPING: A SECURITY CHALLENGE IN NIGERIA". Journal of Security and Sustainability Issues 8, n.º 2 (29 de diciembre de 2018): 111–24. http://dx.doi.org/10.9770/jssi.2018.8.2(10).

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Garde, Hans J. "European security and the Baltic challenge". RUSI Journal 140, n.º 2 (abril de 1995): 19–21. http://dx.doi.org/10.1080/03071849508445902.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Maniatakos, Michail. "Guest Editor Introduction: Embedded Security Challenge". IEEE Embedded Systems Letters 10, n.º 3 (septiembre de 2018): 81–82. http://dx.doi.org/10.1109/les.2018.2829765.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Sommaruga, Cornelio. "The global challenge of human security". Foresight 6, n.º 4 (agosto de 2004): 208–11. http://dx.doi.org/10.1108/14636680410554674.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Eide, Espen Barth. "The Internal Security Challenge in Kosovo". International Spectator 35, n.º 1 (enero de 2000): 49–63. http://dx.doi.org/10.1080/03932720008458113.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Labuschagne, L. y J. H. P. Eloff. "Electronic commerce: the information‐security challenge". Information Management & Computer Security 8, n.º 3 (1 de agosto de 2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.

Texto completo
Resumen
The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Hunter, Philip. "Security vendors tackle multi-gigabit challenge". Computer Fraud & Security 2007, n.º 11 (noviembre de 2007): 14–15. http://dx.doi.org/10.1016/s1361-3723(07)70154-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Goucher, Wendy. "The challenge of security awareness training". Computer Fraud & Security 2009, n.º 10 (octubre de 2009): 15–16. http://dx.doi.org/10.1016/s1361-3723(09)70129-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Ashenden, Debi. "Information Security management: A human challenge?" Information Security Technical Report 13, n.º 4 (noviembre de 2008): 195–201. http://dx.doi.org/10.1016/j.istr.2008.10.006.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Gold, Steve. "Meeting the biometrics payment security challenge". Biometric Technology Today 2013, n.º 10 (noviembre de 2013): 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Dobbie, Stuart. "Challenge of biometric security for banks". Biometric Technology Today 2020, n.º 3 (marzo de 2020): 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30037-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Smith, Martin. "Facing the challenge of IT security". Computers & Security 14, n.º 5 (enero de 1995): 423. http://dx.doi.org/10.1016/0167-4048(95)97134-v.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

ALBIN, CECILIA. "The Global Security Challenge to Negotiation". American Behavioral Scientist 38, n.º 6 (mayo de 1995): 921–48. http://dx.doi.org/10.1177/0002764295038006009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

AL-SUWAIDI, JAMAL S. "Gulf Security and the Iranian Challenge". Security Dialogue 27, n.º 3 (septiembre de 1996): 277–94. http://dx.doi.org/10.1177/0967010696027003004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Miller, S. K. "Facing the challenge of wireless security". Computer 34, n.º 7 (julio de 2001): 16–18. http://dx.doi.org/10.1109/2.933495.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Householder, A., K. Houle y C. Dougherty. "Computer attack trends challenge Internet security". Computer 35, n.º 4 (abril de 2002): sulp5—sulp7. http://dx.doi.org/10.1109/mc.2002.1012422.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

WONG, John. "Food Security as a New Challenge in Asia". East Asian Policy 04, n.º 02 (abril de 2012): 103–6. http://dx.doi.org/10.1142/s1793930512000207.

Texto completo
Resumen
All nations, big or small, are concerned with the issue of food security. Even for Singapore, which is almost 100% dependent on external food supply, it still has to face the challenges of maintaining a stable food supply. Food crisis can potentially emerge as a new challenge for regional security not just in Asia but also for the whole international community as well.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Adebayo, Nehemiah, Amos O. Bajeh, Micheal Arowolo, Erondu Udochuckwu, Kayode Jesujana, Mary Ajayi, Surajudeen Abdulrasaq y John Onyemenam. "Blockchain Technology: A Panacea for IoT Security Challenge". EAI Endorsed Transactions on Internet of Things 8, n.º 3 (4 de octubre de 2022): e3. http://dx.doi.org/10.4108/eetiot.v8i3.1402.

Texto completo
Resumen
The Internet of Things (IoT) platforms, despite the wide range of application is not without loop holes of which cyberattackers can take advantage. In order to improve the platform's security while also increasing other features, it has been proposed that blockchain technology be implemented in any IoT system. However, while blockchain technology has many advantages, it is important to consider other options because they all have their own drawbacks that may not be ideal for every use case situation. IoT network devices have limited computer power, storage space, and bandwidth. As a result, these systems are easily prone to assault than other network connected devices, such PCs, cell phones and tablets. With focus on IoT security challenges and the countermeasures offered by the blockchain technology, consensus algorithm, data encryption and smart contracts were discovered to be the common and effective algorithm employed by the blockchain technology in securing Iot systems over time.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Paul, Pangkaj Chandra, John Loane, Fergal McCaffery y Gilbert Regan. "Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications". Applied System Innovation 4, n.º 4 (12 de octubre de 2021): 76. http://dx.doi.org/10.3390/asi4040076.

Texto completo
Resumen
Assuring security and privacy of data is a key challenge for organizations when developing WBAN applications. The reasons for this challenge include (i) developers have limited knowledge of market-specific regulatory requirements and security standards, and (ii) there are a vast number of security controls with insufficient implementation detail. To address these challenges, we have developed a WBAN data security and privacy risk management framework. The goal of this paper is trifold. First, we present the methodology used to develop the framework. The framework was developed by considering recommendations from legislation and standards. Second, we present the findings from an initial validation of the framework’s usability and effectiveness of the security and privacy controls. Finally, we present an updated version of the framework and explain how it addresses the aforementioned challenges.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

GILL, PETER. "The Intelligence and Security Committee and the challenge of security networks". Review of International Studies 35, n.º 4 (octubre de 2009): 929–41. http://dx.doi.org/10.1017/s0260210509990362.

Texto completo
Resumen
AbstractA major feature of current security is the development of intelligence networks between agencies within and between nations and across public and private sectors. The performance of the UK Intelligence and Security Committee (ISC) is examined within this context, especially regarding allegations of collusion by UK agencies in rendition and torture. Proposed changes to the ISC are discussed and it is argued that the ISC must seek to leverage its limited powers by helping to construct an oversight network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Jha, Shikha. "Impact of National Security Challenge in Development Prospect of South Asia". Unity Journal 3, n.º 01 (6 de marzo de 2022): 305–16. http://dx.doi.org/10.3126/unityj.v3i01.43334.

Texto completo
Resumen
National security has always been viewed as a precondition for sustainable economic, political, and social development. Any sort of challenges or threats upon national security directly infringes the developmental course. South Asia, has been rampantly facing security-related challenges and obstructions as terrorism, counter-terrorism, militarization, and religious extremism, civil war, and border disputes. Such challenges have not only jeopardized the peace within the region but a seething unrest has been pounded in the development process. This paper primarily focuses on national security challenges faced by countries in South Asia. South Asian nations resort to increment of defense budget, militarization, border security, and struggle for nuclear power to address their security challenge. I have examined the impact of such response upon the course of development in this paper. This is a qualitative research and refers to secondary source of data which includes; books, journals, reports of reputed institutes and think tanks. The analysis finds that increasing militarization and defense budget has been abysmal to address national security threat in South Asia. South Asian nations can resort to bilateral talks and diplomatic measure to address their security threats. This will save larger economic resources which could be utilized for development prospect.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Abd Ali, Shams Mhmood, Mohd Najwadi Yusoff y Hasan Falah Hasan. "Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions". Future Internet 15, n.º 1 (12 de enero de 2023): 35. http://dx.doi.org/10.3390/fi15010035.

Texto completo
Resumen
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Beck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, n.º 1 (enero de 2017): 37–43. http://dx.doi.org/10.3141/2604-05.

Texto completo
Resumen
Smart city initiatives, which involve the connection and automation of city systems and services through the use of information and communication technology, offer significant opportunities to improve efficiency and address many environmental, economic, and social issues faced by U.S. cities. However, as systems become increasingly connected and automated, these systems and the people whom they serve become more vulnerable to an array of security threats, including cybersecurity attacks and attacks on the physical infrastructure and human lives. This paper focuses on how U.S. cities plan to mitigate and respond to the security risks that may arise from the integration of technology into transportation systems and connecting transportation system databases. After examining the U.S. Department of Transportation's recent competition Beyond Traffic: Smart City Challenge, this paper evaluates 32 of the 77 first-round applications to the Smart City Challenge submitted by midsize American cities. The paper provides a set of criteria to evaluate the resiliency of the applicants’ transportation systems, that is, the ability of the cities to withstand and respond to security threats and changing conditions. These criteria include the responses of cities to a range of security risks, the response to unknown risks, plans to accommodate risks, and whether cities plan to work with private or public partners to develop security mitigation and response strategies. The paper concludes that only 19 of the 32 first-round applications to the Smart City Challenge evaluated in this paper address security concerns related to the development of smart transportation systems, and the majority of cities with security plans focus only on mass cybersecurity risks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

PEŠEC, MOJCA. "CHINA, SECURITY CHALLENGE FOR THE EUROPEAN UNION". KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (23 de octubre de 2020): 15–30. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.1.

Texto completo
Resumen
Povzetek Strateško tekmovanje Evropske unije s Kitajsko je postalo povsem resnično. Kitajski vpliv v Evropi je ekonomski in geopolitičen. Kitajska je postala gospodarski tekmec, ki si prizadeva prevzeti vodilno mesto na področju razvoja tehnologij, želi pa tudi uveljavljati svoj model družbene ureditve in vladanja. Močnejša kitajska ekonomska prisotnost, kulturne in medijske aktivnosti ter dejavnosti vojaške diplomacije so orodja, s katerimi Kitajska uveljavlja svoj vpliv v odnosih z državami v Evropski uniji in v tistih na njenem obrobju. Najpomembnejši izzivi v odnosih med Kitajsko in Evropo so neuravnoteženost naložb v korist Kitajske, prevzemanje evropskih podjetij, predvsem tistih, ki upravljajo strateško pomembno infrastrukturo, ter povečana dejavnost kitajskih oboroženih sil v mednarodnem okolju. Ključne besede Evropska unija, Kitajska, strateško tekmovanje, varnostni izzivi. Abstract The European Union's strategic competition with China has become a reality. China's influence in Europe is both economic and geopolitical. China has become an economic competitor striving to take the lead in technology development, but it also wants to assert its model of social order and governance. China's stronger economic presence, cultural and media activities, and military diplomacy activities are tools with which China is asserting its influence in relations with countries in and around the European Union. The most important challenges in China-Europe relations are the imbalance of investment in favour of China, the takeover of European companies, especially those that manage strategically important infrastructure, and the increased activity of the Chinese armed forces in the international environment. Key words European Union, China, strategic competition, security challenges.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Trager, Robert F. "The Security Governance Challenge of Emerging Technologies". Orbis 66, n.º 4 (2022): 536–50. http://dx.doi.org/10.1016/j.orbis.2022.08.008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Missiroli, Antonio. "European Security Policy: The Challenge of Coherence". European Foreign Affairs Review 6, Issue 2 (1 de junio de 2001): 177–96. http://dx.doi.org/10.54648/356609.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía