Статті в журналах з теми "ENHANCING SECURITY"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: ENHANCING SECURITY.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "ENHANCING SECURITY".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (August 19, 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Haedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (February 10, 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.

Повний текст джерела
Анотація:
Seaborne trade is an important component of world trade by which, Indonesia’s water becomes very important and vital in contributing to the world economy. Notwithstanding the strategic meaning of Indonesian water to the World, Indonesian water is still the full responsibility of Indonesia. Indonesia has made substantial and sustained efforts to maintain the safety and security of its sea lanes of communication by updating paper charts, installing navigational aids, broadcasting maritime hazards and weather forecasts, and patrolling certain areas. These efforts show that Indonesia, somewhat, has undertaken its obligations in taking care of the international community interests. Nevertheless, user states and other ships which use chokepoints within Indonesia’ water and derive significant benefits within sometimes do not realize as such. Therefore, this article on the results of normative research aims to explain the need to increase maritime security cooperation as a precondition for achieving the common goals of countries that utilize Indonesian waters and surrounding countries as a route of transportation, trade, cultural exchange, science and civilization.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (September 30, 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (June 1, 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Arazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (October 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

van der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.

Повний текст джерела
Анотація:
Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (October 3, 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Modares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (February 1, 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

T.Deshmukh, Ashvini, and Parikshit N . Mahalle. "Enhancing Security in Linux OS." International Journal of Computer Applications 117, no. 12 (May 20, 2015): 34–37. http://dx.doi.org/10.5120/20609-3239.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Canfield, Jonathan, and Mary Alice Haddad. "Japan's Alliance-Enhancing Security Developments." Asia Policy 28, no. 4 (2021): 167–93. http://dx.doi.org/10.1353/asp.2021.0048.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

., Preetha S., Suhas Kini K. ., and Shailesh A. Patil . "ENHANCING SECURITY USING KEYSTROKE DYNAMICS." International Journal of Engineering Applied Sciences and Technology 4, no. 3 (July 31, 2019): 213–25. http://dx.doi.org/10.33564/ijeast.2019.v04i03.037.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Ajit Pratap Singh, Rahul Kumar,. "Enhancing Security using Image Processing." International Journal of Innovative Research in Science, Engineering and Technology 04, no. 04 (April 15, 2015): 2435–42. http://dx.doi.org/10.15680/ijirset.2015.0404045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Dy-Liacco, T. E. "Enhancing power system security control." IEEE Computer Applications in Power 10, no. 3 (July 1997): 38–41. http://dx.doi.org/10.1109/67.595291.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

McGinty, John. "Enhancing Building Security: Design Considerations." Library & Archival Security 21, no. 2 (September 11, 2008): 115–27. http://dx.doi.org/10.1080/01960070802201474.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Ranjan, Nikhil. "Enhancing Voting Security and Efficiency." Journal of Computers, Mechanical and Management 2, no. 3 (August 31, 2023): 9–15. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23065.

Повний текст джерела
Анотація:
This study explores developing and implementing a novel Electronic Voting Machine (EVM) system integrated with biometric identifiers to enhance voting security and efficiency significantly. Traditionally, voting processes relied on paper ballots, a system fraught with several challenges, including over-voting, the loss or misplacement of ballot papers, environmental harm due to paper consumption, and a lengthy result compilation process. An advanced EVM system is proposed to address these issues, leveraging unique biometric identifiers - facial recognition and fingerprints - for voter authentication and secure vote recording. Our EVM system effectively improves the security against bogus voting and vote repetition, which have been significant concerns in previous voting systems. This robust approach to voter authentication minimizes the likelihood of voting fraud, thus contributing to a more reliable and secure voting process. However, the transition to this advanced EVM system is challenging. The study identifies keyimplications, including the impact on employment due to automation, potential inaccuracies and biases associated with biometric technologies, and vital privacy concerns surrounding using sensitive biometric data. Despite these challenges, the proposed system provides a substantial foundation for future enhancements. Opportunities for further development include the integration of additional biometric identifiers like iris recognition, refining the accuracy of current biometric technologies, and strengthening data privacy measures.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Rao Sangarsu, Raghavendr. "Enhancing Cyber Security Using Artificial Intelligence: A Comprehensive Approach." International Journal of Science and Research (IJSR) 12, no. 11 (November 5, 2023): 8–13. http://dx.doi.org/10.21275/sr231029092527.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Kyle Dees and Syed Shawon Rahman. "Enhancing Infrastructure Security in Real Estate." International Journal of Network Security & Its Applications 3, no. 6 (November 30, 2011): 59–80. http://dx.doi.org/10.5121/ijnsa.2011.3604.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Mahajan, Jagruti, Harshada Rathod, Parul Mankar, Monika Korde, Vaishnavi Rathod, and Professor Kalyani Pendke. "Enhancing the Cloud Security via Cryptography." International Journal of Innovations in Engineering and Science 7, no. 9 (August 9, 2022): 92–96. http://dx.doi.org/10.46335/ijies.2022.7.9.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Kushwaha, Dilip Kumar, KM Priyanka, and Harleen Kaur. "Enhancing Web-Security with Stronger Captchas." International Journal of Computer Applications Technology and Research 2, no. 3 (May 10, 2013): 297–301. http://dx.doi.org/10.7753/ijcatr0203.1017.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Kadam, Akshita D. "Enhancing Software Security for Salesforce Applications." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (March 31, 2019): 2176–85. http://dx.doi.org/10.22214/ijraset.2019.3401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Jafari, Said. "Enhancing Security Culture through User-Engagement." International Journal of ICT Research in Africa and the Middle East 6, no. 1 (January 2017): 31–39. http://dx.doi.org/10.4018/ijictrame.2017010103.

Повний текст джерела
Анотація:
This paper presents the survey conducted to assess end-user engagement in building organisation's security. A total of forty-eight (48) responses were collected from fifteen (15) mid-sized business organisations and institutions in Tanzania. The results show that little has been done to facilitate end-user engagement in building secure organisation. Also, the survey showed that old security problem such as passwords sharing still exist. The findings from this paper can be used by security officers and implementers within organisation to build and maintain sustainable secure organisation.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Fisher, Madeline. "Enhancing food security in the Northeast." CSA News 59, no. 7 (June 30, 2014): 4–9. http://dx.doi.org/10.2134/csa2014-59-7-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Jose, M. Victor, and V. Seenivasagam. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.080457.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Seenivasagam, V., and M. Victor Jose. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.10001386.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Bohli, J.-M., N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. "Security and Privacy-Enhancing Multicloud Architectures." IEEE Transactions on Dependable and Secure Computing 10, no. 4 (July 2013): 212–24. http://dx.doi.org/10.1109/tdsc.2013.6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

McKerchar, Christina, Sharron Bowers, Craig Heta, Louise Signal, and Leonie Matoe. "Enhancing Māori food security using traditionalkai." Global Health Promotion 22, no. 3 (August 2014): 15–24. http://dx.doi.org/10.1177/1757975914543573.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Eskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (September 2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Gothawal, Deepali Bankatsingh, and S. V. Nagaraj. "Intrusion Detection for Enhancing RPL Security." Procedia Computer Science 165 (2019): 565–72. http://dx.doi.org/10.1016/j.procs.2020.01.051.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Valentine, J. Andrew. "Enhancing the employee security awareness model." Computer Fraud & Security 2006, no. 6 (June 2006): 17–19. http://dx.doi.org/10.1016/s1361-3723(06)70370-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Farnworth, Richard. "Enhancing security for the mobile workforce." Biometric Technology Today 16, no. 1 (January 2008): 8. http://dx.doi.org/10.1016/s0969-4765(08)70017-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Caloyannides, M. "Enhancing Security: Not for the Conformist." IEEE Security and Privacy Magazine 2, no. 6 (November 2004): 88–87. http://dx.doi.org/10.1109/msp.2004.98.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Sharma, Srinarayan, and Vijayan Sugumaran. "A Framework for Enhancing Systems Security." Journal of Information Privacy and Security 7, no. 4 (October 2011): 3–22. http://dx.doi.org/10.1080/15536548.2011.10855921.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Highland, Esther H. "VMSecure: Enhancing VM security and control." Computers & Security 7, no. 3 (June 1988): 327–28. http://dx.doi.org/10.1016/0167-4048(88)90092-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Hammood et. al., Maytham M. "Enhancing Security and Speed of RC4." International Journal of Computing and Network Technology 03, no. 02 (May 1, 2015): 37–48. http://dx.doi.org/10.12785/ijcnt/030201.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Botacin, Marcus, Paulo Lício De Geus, and André Grégio. "Enhancing Branch Monitoring for Security Purposes." ACM Transactions on Privacy and Security 21, no. 1 (January 6, 2018): 1–30. http://dx.doi.org/10.1145/3152162.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Neves, Ângelo, and Gisele Lemes Veiga Araujo. "Smart Automation for Enhancing Cyber-Security." Foresight and STI Governance 17, no. 1 (March 20, 2023): 89–97. http://dx.doi.org/10.17323/2500-2597.2023.1.89.97.

Повний текст джерела
Анотація:
In an intelligent automation ecosystem, namely in the context of Robotic Process Automation, there is a need to review the development and operation processes and practices, to combine competences from these two areas with the common good necessary for any organization or security team. It is with security that quality, efficiency, and profitability become possible. The elaboration of guidelines and best practices for the application of a DevSecOps culture is currently essential for Agile software development at any organization. In the digitalization era, teams increasingly need a collaborative method to involve several competencies and capabilities, from analysis to implementation and the evolution of a software product. Information security needs to be an integral part throughout the entire product’s lifecycle, as without it, fundamental aspects of confidentiality, integrity, and availability put information and software security at serious risk in the course of business operations. Without losing focus on customer needs, it is necessary to model software development practices, following more agile methodologies. In this way, teams can model the software throughout its lifecycle, focusing on facilitating the delivery of value to the customer and having greater certainty that requirements, plans, and results are 100% aligned with customer needs. This paper presents an analysis and proposal for the continuous improvement of an intelligent automation platform at a large-scale multinational organization. In parallel, aspects that generate resistance to the implementation of a DevSecOps methodology within the scope of RPA code development is considered.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

C. Smith, Mary. "Enhancing food security through Public Enterprise." Public Enterprise Half-Yearly Journal 27, no. 1 (December 31, 2023): 64–77. http://dx.doi.org/10.21571/pehyj.2023.2701.05.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

R., Surya. "Enhancing the Security of Medical Data Using Time Stamp Series." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 5822–28. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020289.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Mathur, Sonali, Shankar Lal Gupta, and Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence." International Journal of Information Retrieval Research 10, no. 4 (October 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.

Повний текст джерела
Анотація:
Data warehouses are the most valuable assets of an organization and are basically used for critical business and decision-making purposes. Data from different sources is integrated into the data warehouse. Thus, security issues arise as data is moved from one place to another. Data warehouse security addresses the methodologies that can be used to secure the data warehouse by protecting information from being accessed by unauthorized users for maintaining the reliability of the data warehouse. A data warehouse invariably contains information which needs to be considered extremely sensitive and confidential. Protecting this information is invariably very important as data in the data warehouse is accessed by users at various levels in the organization. The authors propose a method to protect information based on an encryption scheme which secures the data in the data warehouse. This article presents the most feasible security algorithm that can be used for securing the data stored in the operational database so as to prevent unauthorized access.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Molina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (July 16, 2018): e2038. http://dx.doi.org/10.1002/nem.2038.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (September 1, 2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Повний текст джерела
Анотація:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret sharing on the security and management of IoT devices, especially home appliances.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Asfoor, Ayman. "The Role of Psychological Capital, Sanction and Organization Security Resources in Enhancing the Security behaviour of Employees who Violate Security Policies." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 614–18. http://dx.doi.org/10.55248/gengpi.4.823.30603.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Williams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Aslam, Mubeen. "Enhancing Information Security Management by STOPE View with Six Sigma Approach." International Journal of Engineering and Technology 4, no. 6 (2012): 743–46. http://dx.doi.org/10.7763/ijet.2012.v4.475.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Setia, Prashant, and Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain." Suranaree Journal of Science and Technology 30, no. 4 (October 9, 2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.

Повний текст джерела
Анотація:
The expansion of IoT devices over the past years has led to the development of smart ecosystems susceptible to cyberattacks. These ecosystems include smart industries and smart home security systems. However, when these devices are widely deployed and generate significant amounts of data, this data must be securely stored on the cloud to prevent it from being compromised by serious cyber attacks. Although traditional security methods partly meet the need to protect the privacy and security of smart IoT ecosystems, their centralized structure and limited computing power make them inefficient. However, recent advancements in blockchain technology have made it possible to employ decentralized architectures to enhance the cybersecurity defense mechanisms of IoT ecosystems. The utilization of blockchain-enabled methodologies is considered one of the most auspicious advancements in the domain of the IoT. These techniques offer a secure and decentralized mode of communication among internet-connected devices. This study presents a blockchain-based novel framework to enhance the cybersecurity measures of smart IoT ecosystem installations. The proposed framework prioritizes the immutability of devices and users present in such environments and incorporates smart contracts to ensure their overall security. Furthermore, the system includes a module for regularly verifying the firmware of connected devices by comparing them to the valid firmware hashes present in the smart contract's storage. The proposed approach has also come up with the idea of blacklisting the malicious IP addresses trying to connect with IoT ecosystems network.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

ANDROJNA, ANDREJ. "OBALNA STRAŽA – DEJAVNIK POVEČANJA VARNOSTI V POMORSKEM PROMETU." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2015/ ISSUE 17/1 (May 30, 2015): 63–79. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.17.1.4.

Повний текст джерела
Анотація:
V sodobnem svetu je morje s svojo prostranostjo eden najpomembnejših virov gospodarske blaginje pomorskih držav. Zaradi svoje širine je odprto vplivom interakcij v vseh pogledih, tudi v varnostnem. Spoprijemanje z današnjimi izzivi določa uporabo širokega spektra civilnih in vojaških zmogljivosti, izboljšano sodelovanje ter usklajevanje vseh vključenih subjektov in tudi pripravo enotnega subjekta nacionalne varnosti. Članek predstavlja iskanje novih sistemskih oblik zagotavljanja ustrezne zaščite in varnosti morja. Na sintezi študije uspešno organiziranih tujih sorodnih institucij in enakovredne sektorske preučitve nacionalnih varnostnih podsistemov je izdelan model Obalne straže Republike Slovenije, s katerim bi lahko dosegli bistveno višjo raven učinkovitosti in konsistentnosti državnih organov na področju varovanja, nadzora in zaščite teritorialnega morja ter racionalizacijo porabe proračunskih sredstev. Ob tem pa ostaja izziv implementacija omenjenega modela ter njegova umestitev v nacionalni varnostno-obrambni sistem. In the modern world, the sea is one of the most important resources of the economic welfare of countries with access to the sea. Due to its broadness, it is susceptible to the influence of all types of interactions, including security. Meeting today's security challenges requires a wide spectrum of civil and military capabilities. It calls for cooperation, regular coordination of all entities involved, as well as a unified national security structure. The article presents the search for new systematic forms to ensure adequate maritime security and safety at sea. Based on the research on successfully organized similar foreign institutions in relation to the national security institutions in the maritime domain, the Coast Guard model of the Republic of Slovenia is designed. The model could significantly improve the level of efficiency and consistency of national authorities in the area of control, security and safety of the territorial sea and rationalize expenditures. However, the implementation of the proposed model and its incorporation into the national security and defence system, remain a challenge.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Sachdev, Abha, and Mohit Bhansali. "Enhancing Cloud Computing Security using AES Algorithm." International Journal of Computer Applications 67, no. 9 (April 18, 2013): 19–23. http://dx.doi.org/10.5120/11422-6766.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Yousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing Approach for Information Security in Hadoop." Polytechnic Journal 10, no. 1 (June 30, 2020): 81–87. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp81-87.

Повний текст джерела
Анотація:
Developing a confident Hadoop essentially a cloud computing is an essential challenge as the cloud. The protection policy can be utilized during various cloud services such as Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS) and also can support most requirements in cloud computing. This event motivates the need of a policy which will control these challenges. Hadoop may be a used policy recommended to beat this big data problem which usually utilizes MapReduce design to arrange huge amounts of information of the cloud system. Hadoop has no policy to ensure the privacy and protection of the files saved within the Hadoop Distributed File System (HDFS). Within the cloud, the safety of sensitive data may be a significant problem within which encryption schemes play an avital rule. This paper proposes a hybrid method between pair well-known asymmetric key cryptosystems (RSA and Rabin) to cipher the files saved in HDFS. Therefore, before storing data in HDFS, the proposed cryptosystem is employed to cipher the information. In the proposed system, the user of the cloud might upload files in two ways, secure or non-secure. The hybrid method presents more powerful computational complexity and smaller latency as compared to the RSA cryptosystem alone.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії