Articles de revues sur le sujet « Security challenge »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security challenge.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Security challenge ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Streater, K. « Cyber Security Challenge ». ITNOW 52, no 6 (1 novembre 2010) : 28. http://dx.doi.org/10.1093/itnow/bwq218.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Waugh, William L. « Securing Mass Transit : A Challenge for Homeland Security ». Review of Policy Research 21, no 3 (mai 2004) : 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Fair, C. Christine. « Pakistan's Security-Governance Challenge ». Current History 110, no 735 (1 avril 2011) : 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Szönyi, István. « Hungary : A security challenge ? » International Spectator 29, no 1 (janvier 1994) : 89–108. http://dx.doi.org/10.1080/03932729408458041.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kurpjuhn, Thorsten. « The SME security challenge ». Computer Fraud & ; Security 2015, no 3 (mars 2015) : 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Beysenov, B. K., et A. Igisenova. « Global challenge and spiritual security ». Eurasian Journal of Religious studies 2, no 2 (2015) : 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

McCluskey, B. « Connected cars - the security challenge ». Engineering & ; Technology 12, no 2 (1 mars 2017) : 54–57. http://dx.doi.org/10.1049/et.2017.0205.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Carroll, John E. « The Acid Challenge to Security ». Bulletin of the Atomic Scientists 45, no 8 (octobre 1989) : 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lafuente, Guillermo. « The big data security challenge ». Network Security 2015, no 1 (janvier 2015) : 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

EMBER, LOIS. « Diseases Pose National Security Challenge ». Chemical & ; Engineering News 78, no 11 (13 mars 2000) : 10. http://dx.doi.org/10.1021/cen-v078n011.p010.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Hoving, Per. « System security : The technical challenge ». Computers & ; Security 5, no 1 (mars 1986) : 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Farrant, Alex. « 5G and the Security Challenge ». New Electronics 51, no 20 (12 novembre 2019) : 27–28. http://dx.doi.org/10.12968/s0047-9624(22)61484-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Nelson, Margaret C., Scott E. Ingram, Andrew J. Dugmore, Richard Streeter, Matthew A. Peeples, Thomas H. McGovern, Michelle Hegmon et al. « Climate challenges, vulnerabilities, and food security ». Proceedings of the National Academy of Sciences 113, no 2 (28 décembre 2015) : 298–303. http://dx.doi.org/10.1073/pnas.1506494113.

Texte intégral
Résumé :
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Dhakal, Bikash. « Assessing geopolitics as Nepal's national security challenge ». Unity Journal 1 (1 février 2020) : 14–20. http://dx.doi.org/10.3126/unityj.v1i0.35690.

Texte intégral
Résumé :
The increased geo-strategic interests and concerns of great powers have posed serious challenges to national security of Nepal. This article objectively analyzes the impacts of geopolitics on Nepal's national security. It intends to examine the National security within the framework of geopolitical rivalry. Geopolitics is rather a crucial external factor than the other internal factors of insecurity. Thus, this article attempts to justify how regional and global geopolitical developments challenge Nepal's national security. This article explains geopolitical factors that can pose threat and challenge to national security.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Patankar, Manoj S., et Louis Holscher. « Accessibility vs Security : The Challenge to Airport Security Systems ». Security Journal 13, no 2 (avril 2000) : 7–19. http://dx.doi.org/10.1057/palgrave.sj.8340046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Cîrdei, Ionuț Alin, et Lucian Ispas. « Challenges to European and Euro-Atlantic Security ». International conference KNOWLEDGE-BASED ORGANIZATION 28, no 1 (1 juin 2022) : 7–14. http://dx.doi.org/10.2478/kbo-2022-0002.

Texte intégral
Résumé :
Abstract The current security environment is characterized by uncertainty and multiple transformations in all areas. Mankind as a whole enjoys an extremely favorable context and an indisputable climate of security. However, security challenges are becoming more and more difficult to anticipate. The last few years have brought a new pandemic challenge to all states, which has put all systems to the test. In addition to the pandemic challenge, European and Euro-Atlantic countries face a military challenge that has the potential to directly affect regional and global security and cause shock waves in all areas, especially in the economic, political, diplomatic and military field. To these major challenges are added the challenges that have now faded into the background, such as climate change, the impact of natural disasters, organized crime, terrorism, and so on. In order to meet these new challenges, the European and Euro-Atlantic states must demonstrate cohesion and determination and take effective and decisive action to protect their interests and ensure the security and stability of their allies.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Dynon, Nicholas. « Securing Public Places : New Zealand’s Private Security Sector as a National Security Enabler ». National Security Journal 1, no 1 (octobre 2019) : 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Texte intégral
Résumé :
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?
Styles APA, Harvard, Vancouver, ISO, etc.
18

Murtaza, Mirza B. « Risk Management For Health Information Security And Privacy ». American Journal of Health Sciences (AJHS) 3, no 2 (2 avril 2012) : 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Texte intégral
Résumé :
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Riaz, Naveed, Ayesha Riaz et Sajid Ali Khan. « Biometric template security : an overview ». Sensor Review 38, no 1 (15 janvier 2018) : 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Texte intégral
Résumé :
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Taranenko, Anna. « THE EU MIGRATION CRISIS AS A CHALLENGE TO EUROPEAN REGIONAL SECURITY ». Politology bulletin, no 86 (2021) : 210–24. http://dx.doi.org/10.17721/2415-881x.2021.86.210-224.

Texte intégral
Résumé :
The EU migration crisis is analyzed as a challenge to European regional security. The used method is historical and comparative. As a result, it can be stated that migration is a global trend which has become especially dynamic in the second half of the 20th. Dynamic migration processes, in their turn, stipulate the importance of efficient ethnic policy of recipient states. Since 2015 the European Union authorities took measures in order respond to the migration crisis effectively, strengthen regional security and enhance borders control. The EU makes further efforts in order strengthen intersectoral cooperation between various political and security agencies responsible for tackling the migration crisis. To a certain extent, the migration crisis of 2015 posed a threat to the European Union unity and security and also raises questions about further integration of the European Union. The migration crisis has demonstrated that the EU needs to efficiently adapt its security strategy to new challenges. It can be concluded that the current migration crisis processes in the EU challenge further European integration and regional European security. Core democratic values have been challenged by the migration crisis, in particular, freedom of movement and civil protection and in order to enhance regional security in Europe one can further utilize the civil society potential and track-II diplomacy instruments.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh et Suresh Shanmugasundaram. « Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks ». International Journal of Applied Metaheuristic Computing 10, no 4 (octobre 2019) : 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Texte intégral
Résumé :
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
Styles APA, Harvard, Vancouver, ISO, etc.
22

LemaîTre, Pierre. « The Gorbachev challenge and European security ». International Affairs 65, no 2 (1989) : 357–58. http://dx.doi.org/10.2307/2622134.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Pervez, Laiba, Aiza Khan et Noor ul Ain. « Cyber Security Challenge in an Automobile ». International Journal of Scientific and Research Publications (IJSRP) 10, no 12 (6 décembre 2020) : 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Lakušić, Milovan, et Sofija Lolić. « Terrorism as a contemporary security challenge ». Megatrend revija 18, no 4 (2021) : 389–400. http://dx.doi.org/10.5937/megrev2104389l.

Texte intégral
Résumé :
Terrorism is one of the greatest challenges to modern security. In this paper, we try to explain how terrorism is regulated in the legislation of the Republic of Serbia and how and in what way it affects the security of the Republic of Serbia and surrounding countries. Starting with the AP of Kosovo and Metohija, where terrorism appears in the 1990s in the idea of creating a "Greater Albania". Terrorism as a phenomenon is based on the use of violence and an ideology that is religiously, racially or ethnically firmly determined. Terrorism as a crime in our legislation is one of the most serious crimes classified in the category of crimes against humanity and other goods protected internationally. What is considered a problem in the fight against terrorism is that even today there is no generally accepted understanding of what terrorism really is? This phenomenon, which is already gaining momentum today, is constantly advancing in every sense, and it is necessary to start finding a path that leads to controlling this phenomenon. By violating human rights and other material goods, terrorism threatens the global order.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Ezemenaka, Kingsley Emeka. « KIDNAPPING : A SECURITY CHALLENGE IN NIGERIA ». Journal of Security and Sustainability Issues 8, no 2 (29 décembre 2018) : 111–24. http://dx.doi.org/10.9770/jssi.2018.8.2(10).

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Garde, Hans J. « European security and the Baltic challenge ». RUSI Journal 140, no 2 (avril 1995) : 19–21. http://dx.doi.org/10.1080/03071849508445902.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Maniatakos, Michail. « Guest Editor Introduction : Embedded Security Challenge ». IEEE Embedded Systems Letters 10, no 3 (septembre 2018) : 81–82. http://dx.doi.org/10.1109/les.2018.2829765.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Sommaruga, Cornelio. « The global challenge of human security ». Foresight 6, no 4 (août 2004) : 208–11. http://dx.doi.org/10.1108/14636680410554674.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Eide, Espen Barth. « The Internal Security Challenge in Kosovo ». International Spectator 35, no 1 (janvier 2000) : 49–63. http://dx.doi.org/10.1080/03932720008458113.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Labuschagne, L., et J. H. P. Eloff. « Electronic commerce : the information‐security challenge ». Information Management & ; Computer Security 8, no 3 (1 août 2000) : 154–57. http://dx.doi.org/10.1108/09685220010372582.

Texte intégral
Résumé :
The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Hunter, Philip. « Security vendors tackle multi-gigabit challenge ». Computer Fraud & ; Security 2007, no 11 (novembre 2007) : 14–15. http://dx.doi.org/10.1016/s1361-3723(07)70154-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Goucher, Wendy. « The challenge of security awareness training ». Computer Fraud & ; Security 2009, no 10 (octobre 2009) : 15–16. http://dx.doi.org/10.1016/s1361-3723(09)70129-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Ashenden, Debi. « Information Security management : A human challenge ? » Information Security Technical Report 13, no 4 (novembre 2008) : 195–201. http://dx.doi.org/10.1016/j.istr.2008.10.006.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Gold, Steve. « Meeting the biometrics payment security challenge ». Biometric Technology Today 2013, no 10 (novembre 2013) : 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Dobbie, Stuart. « Challenge of biometric security for banks ». Biometric Technology Today 2020, no 3 (mars 2020) : 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30037-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Smith, Martin. « Facing the challenge of IT security ». Computers & ; Security 14, no 5 (janvier 1995) : 423. http://dx.doi.org/10.1016/0167-4048(95)97134-v.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

ALBIN, CECILIA. « The Global Security Challenge to Negotiation ». American Behavioral Scientist 38, no 6 (mai 1995) : 921–48. http://dx.doi.org/10.1177/0002764295038006009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

AL-SUWAIDI, JAMAL S. « Gulf Security and the Iranian Challenge ». Security Dialogue 27, no 3 (septembre 1996) : 277–94. http://dx.doi.org/10.1177/0967010696027003004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Miller, S. K. « Facing the challenge of wireless security ». Computer 34, no 7 (juillet 2001) : 16–18. http://dx.doi.org/10.1109/2.933495.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Householder, A., K. Houle et C. Dougherty. « Computer attack trends challenge Internet security ». Computer 35, no 4 (avril 2002) : sulp5—sulp7. http://dx.doi.org/10.1109/mc.2002.1012422.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

WONG, John. « Food Security as a New Challenge in Asia ». East Asian Policy 04, no 02 (avril 2012) : 103–6. http://dx.doi.org/10.1142/s1793930512000207.

Texte intégral
Résumé :
All nations, big or small, are concerned with the issue of food security. Even for Singapore, which is almost 100% dependent on external food supply, it still has to face the challenges of maintaining a stable food supply. Food crisis can potentially emerge as a new challenge for regional security not just in Asia but also for the whole international community as well.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Adebayo, Nehemiah, Amos O. Bajeh, Micheal Arowolo, Erondu Udochuckwu, Kayode Jesujana, Mary Ajayi, Surajudeen Abdulrasaq et John Onyemenam. « Blockchain Technology : A Panacea for IoT Security Challenge ». EAI Endorsed Transactions on Internet of Things 8, no 3 (4 octobre 2022) : e3. http://dx.doi.org/10.4108/eetiot.v8i3.1402.

Texte intégral
Résumé :
The Internet of Things (IoT) platforms, despite the wide range of application is not without loop holes of which cyberattackers can take advantage. In order to improve the platform's security while also increasing other features, it has been proposed that blockchain technology be implemented in any IoT system. However, while blockchain technology has many advantages, it is important to consider other options because they all have their own drawbacks that may not be ideal for every use case situation. IoT network devices have limited computer power, storage space, and bandwidth. As a result, these systems are easily prone to assault than other network connected devices, such PCs, cell phones and tablets. With focus on IoT security challenges and the countermeasures offered by the blockchain technology, consensus algorithm, data encryption and smart contracts were discovered to be the common and effective algorithm employed by the blockchain technology in securing Iot systems over time.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Paul, Pangkaj Chandra, John Loane, Fergal McCaffery et Gilbert Regan. « Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications ». Applied System Innovation 4, no 4 (12 octobre 2021) : 76. http://dx.doi.org/10.3390/asi4040076.

Texte intégral
Résumé :
Assuring security and privacy of data is a key challenge for organizations when developing WBAN applications. The reasons for this challenge include (i) developers have limited knowledge of market-specific regulatory requirements and security standards, and (ii) there are a vast number of security controls with insufficient implementation detail. To address these challenges, we have developed a WBAN data security and privacy risk management framework. The goal of this paper is trifold. First, we present the methodology used to develop the framework. The framework was developed by considering recommendations from legislation and standards. Second, we present the findings from an initial validation of the framework’s usability and effectiveness of the security and privacy controls. Finally, we present an updated version of the framework and explain how it addresses the aforementioned challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
44

GILL, PETER. « The Intelligence and Security Committee and the challenge of security networks ». Review of International Studies 35, no 4 (octobre 2009) : 929–41. http://dx.doi.org/10.1017/s0260210509990362.

Texte intégral
Résumé :
AbstractA major feature of current security is the development of intelligence networks between agencies within and between nations and across public and private sectors. The performance of the UK Intelligence and Security Committee (ISC) is examined within this context, especially regarding allegations of collusion by UK agencies in rendition and torture. Proposed changes to the ISC are discussed and it is argued that the ISC must seek to leverage its limited powers by helping to construct an oversight network.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Jha, Shikha. « Impact of National Security Challenge in Development Prospect of South Asia ». Unity Journal 3, no 01 (6 mars 2022) : 305–16. http://dx.doi.org/10.3126/unityj.v3i01.43334.

Texte intégral
Résumé :
National security has always been viewed as a precondition for sustainable economic, political, and social development. Any sort of challenges or threats upon national security directly infringes the developmental course. South Asia, has been rampantly facing security-related challenges and obstructions as terrorism, counter-terrorism, militarization, and religious extremism, civil war, and border disputes. Such challenges have not only jeopardized the peace within the region but a seething unrest has been pounded in the development process. This paper primarily focuses on national security challenges faced by countries in South Asia. South Asian nations resort to increment of defense budget, militarization, border security, and struggle for nuclear power to address their security challenge. I have examined the impact of such response upon the course of development in this paper. This is a qualitative research and refers to secondary source of data which includes; books, journals, reports of reputed institutes and think tanks. The analysis finds that increasing militarization and defense budget has been abysmal to address national security threat in South Asia. South Asian nations can resort to bilateral talks and diplomatic measure to address their security threats. This will save larger economic resources which could be utilized for development prospect.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Abd Ali, Shams Mhmood, Mohd Najwadi Yusoff et Hasan Falah Hasan. « Redactable Blockchain : Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions ». Future Internet 15, no 1 (12 janvier 2023) : 35. http://dx.doi.org/10.3390/fi15010035.

Texte intégral
Résumé :
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Beck, Kate. « Smart Security ? » Transportation Research Record : Journal of the Transportation Research Board 2604, no 1 (janvier 2017) : 37–43. http://dx.doi.org/10.3141/2604-05.

Texte intégral
Résumé :
Smart city initiatives, which involve the connection and automation of city systems and services through the use of information and communication technology, offer significant opportunities to improve efficiency and address many environmental, economic, and social issues faced by U.S. cities. However, as systems become increasingly connected and automated, these systems and the people whom they serve become more vulnerable to an array of security threats, including cybersecurity attacks and attacks on the physical infrastructure and human lives. This paper focuses on how U.S. cities plan to mitigate and respond to the security risks that may arise from the integration of technology into transportation systems and connecting transportation system databases. After examining the U.S. Department of Transportation's recent competition Beyond Traffic: Smart City Challenge, this paper evaluates 32 of the 77 first-round applications to the Smart City Challenge submitted by midsize American cities. The paper provides a set of criteria to evaluate the resiliency of the applicants’ transportation systems, that is, the ability of the cities to withstand and respond to security threats and changing conditions. These criteria include the responses of cities to a range of security risks, the response to unknown risks, plans to accommodate risks, and whether cities plan to work with private or public partners to develop security mitigation and response strategies. The paper concludes that only 19 of the 32 first-round applications to the Smart City Challenge evaluated in this paper address security concerns related to the development of smart transportation systems, and the majority of cities with security plans focus only on mass cybersecurity risks.
Styles APA, Harvard, Vancouver, ISO, etc.
48

PEŠEC, MOJCA. « CHINA, SECURITY CHALLENGE FOR THE EUROPEAN UNION ». KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (23 octobre 2020) : 15–30. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.1.

Texte intégral
Résumé :
Povzetek Strateško tekmovanje Evropske unije s Kitajsko je postalo povsem resnično. Kitajski vpliv v Evropi je ekonomski in geopolitičen. Kitajska je postala gospodarski tekmec, ki si prizadeva prevzeti vodilno mesto na področju razvoja tehnologij, želi pa tudi uveljavljati svoj model družbene ureditve in vladanja. Močnejša kitajska ekonomska prisotnost, kulturne in medijske aktivnosti ter dejavnosti vojaške diplomacije so orodja, s katerimi Kitajska uveljavlja svoj vpliv v odnosih z državami v Evropski uniji in v tistih na njenem obrobju. Najpomembnejši izzivi v odnosih med Kitajsko in Evropo so neuravnoteženost naložb v korist Kitajske, prevzemanje evropskih podjetij, predvsem tistih, ki upravljajo strateško pomembno infrastrukturo, ter povečana dejavnost kitajskih oboroženih sil v mednarodnem okolju. Ključne besede Evropska unija, Kitajska, strateško tekmovanje, varnostni izzivi. Abstract The European Union's strategic competition with China has become a reality. China's influence in Europe is both economic and geopolitical. China has become an economic competitor striving to take the lead in technology development, but it also wants to assert its model of social order and governance. China's stronger economic presence, cultural and media activities, and military diplomacy activities are tools with which China is asserting its influence in relations with countries in and around the European Union. The most important challenges in China-Europe relations are the imbalance of investment in favour of China, the takeover of European companies, especially those that manage strategically important infrastructure, and the increased activity of the Chinese armed forces in the international environment. Key words European Union, China, strategic competition, security challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Trager, Robert F. « The Security Governance Challenge of Emerging Technologies ». Orbis 66, no 4 (2022) : 536–50. http://dx.doi.org/10.1016/j.orbis.2022.08.008.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Missiroli, Antonio. « European Security Policy : The Challenge of Coherence ». European Foreign Affairs Review 6, Issue 2 (1 juin 2001) : 177–96. http://dx.doi.org/10.54648/356609.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie