Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security challenge.

Статті в журналах з теми "Security challenge"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security challenge".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Streater, K. "Cyber Security Challenge." ITNOW 52, no. 6 (November 1, 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Waugh, William L. "Securing Mass Transit: A Challenge for Homeland Security." Review of Policy Research 21, no. 3 (May 2004): 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Fair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (April 1, 2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Szönyi, István. "Hungary: A security challenge?" International Spectator 29, no. 1 (January 1994): 89–108. http://dx.doi.org/10.1080/03932729408458041.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kurpjuhn, Thorsten. "The SME security challenge." Computer Fraud & Security 2015, no. 3 (March 2015): 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Beysenov, B. K., and A. Igisenova. "Global challenge and spiritual security." Eurasian Journal of Religious studies 2, no. 2 (2015): 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

McCluskey, B. "Connected cars - the security challenge." Engineering & Technology 12, no. 2 (March 1, 2017): 54–57. http://dx.doi.org/10.1049/et.2017.0205.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Carroll, John E. "The Acid Challenge to Security." Bulletin of the Atomic Scientists 45, no. 8 (October 1989): 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lafuente, Guillermo. "The big data security challenge." Network Security 2015, no. 1 (January 2015): 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

EMBER, LOIS. "Diseases Pose National Security Challenge." Chemical & Engineering News 78, no. 11 (March 13, 2000): 10. http://dx.doi.org/10.1021/cen-v078n011.p010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Hoving, Per. "System security: The technical challenge." Computers & Security 5, no. 1 (March 1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Farrant, Alex. "5G and the Security Challenge." New Electronics 51, no. 20 (November 12, 2019): 27–28. http://dx.doi.org/10.12968/s0047-9624(22)61484-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Nelson, Margaret C., Scott E. Ingram, Andrew J. Dugmore, Richard Streeter, Matthew A. Peeples, Thomas H. McGovern, Michelle Hegmon, et al. "Climate challenges, vulnerabilities, and food security." Proceedings of the National Academy of Sciences 113, no. 2 (December 28, 2015): 298–303. http://dx.doi.org/10.1073/pnas.1506494113.

Повний текст джерела
Анотація:
This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Dhakal, Bikash. "Assessing geopolitics as Nepal's national security challenge." Unity Journal 1 (February 1, 2020): 14–20. http://dx.doi.org/10.3126/unityj.v1i0.35690.

Повний текст джерела
Анотація:
The increased geo-strategic interests and concerns of great powers have posed serious challenges to national security of Nepal. This article objectively analyzes the impacts of geopolitics on Nepal's national security. It intends to examine the National security within the framework of geopolitical rivalry. Geopolitics is rather a crucial external factor than the other internal factors of insecurity. Thus, this article attempts to justify how regional and global geopolitical developments challenge Nepal's national security. This article explains geopolitical factors that can pose threat and challenge to national security.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Patankar, Manoj S., and Louis Holscher. "Accessibility vs Security: The Challenge to Airport Security Systems." Security Journal 13, no. 2 (April 2000): 7–19. http://dx.doi.org/10.1057/palgrave.sj.8340046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Cîrdei, Ionuț Alin, and Lucian Ispas. "Challenges to European and Euro-Atlantic Security." International conference KNOWLEDGE-BASED ORGANIZATION 28, no. 1 (June 1, 2022): 7–14. http://dx.doi.org/10.2478/kbo-2022-0002.

Повний текст джерела
Анотація:
Abstract The current security environment is characterized by uncertainty and multiple transformations in all areas. Mankind as a whole enjoys an extremely favorable context and an indisputable climate of security. However, security challenges are becoming more and more difficult to anticipate. The last few years have brought a new pandemic challenge to all states, which has put all systems to the test. In addition to the pandemic challenge, European and Euro-Atlantic countries face a military challenge that has the potential to directly affect regional and global security and cause shock waves in all areas, especially in the economic, political, diplomatic and military field. To these major challenges are added the challenges that have now faded into the background, such as climate change, the impact of natural disasters, organized crime, terrorism, and so on. In order to meet these new challenges, the European and Euro-Atlantic states must demonstrate cohesion and determination and take effective and decisive action to protect their interests and ensure the security and stability of their allies.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Dynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (October 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Повний текст джерела
Анотація:
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Повний текст джерела
Анотація:
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Riaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Повний текст джерела
Анотація:
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Taranenko, Anna. "THE EU MIGRATION CRISIS AS A CHALLENGE TO EUROPEAN REGIONAL SECURITY." Politology bulletin, no. 86 (2021): 210–24. http://dx.doi.org/10.17721/2415-881x.2021.86.210-224.

Повний текст джерела
Анотація:
The EU migration crisis is analyzed as a challenge to European regional security. The used method is historical and comparative. As a result, it can be stated that migration is a global trend which has become especially dynamic in the second half of the 20th. Dynamic migration processes, in their turn, stipulate the importance of efficient ethnic policy of recipient states. Since 2015 the European Union authorities took measures in order respond to the migration crisis effectively, strengthen regional security and enhance borders control. The EU makes further efforts in order strengthen intersectoral cooperation between various political and security agencies responsible for tackling the migration crisis. To a certain extent, the migration crisis of 2015 posed a threat to the European Union unity and security and also raises questions about further integration of the European Union. The migration crisis has demonstrated that the EU needs to efficiently adapt its security strategy to new challenges. It can be concluded that the current migration crisis processes in the EU challenge further European integration and regional European security. Core democratic values have been challenged by the migration crisis, in particular, freedom of movement and civil protection and in order to enhance regional security in Europe one can further utilize the civil society potential and track-II diplomacy instruments.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Повний текст джерела
Анотація:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

LemaîTre, Pierre. "The Gorbachev challenge and European security." International Affairs 65, no. 2 (1989): 357–58. http://dx.doi.org/10.2307/2622134.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Pervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Lakušić, Milovan, and Sofija Lolić. "Terrorism as a contemporary security challenge." Megatrend revija 18, no. 4 (2021): 389–400. http://dx.doi.org/10.5937/megrev2104389l.

Повний текст джерела
Анотація:
Terrorism is one of the greatest challenges to modern security. In this paper, we try to explain how terrorism is regulated in the legislation of the Republic of Serbia and how and in what way it affects the security of the Republic of Serbia and surrounding countries. Starting with the AP of Kosovo and Metohija, where terrorism appears in the 1990s in the idea of creating a "Greater Albania". Terrorism as a phenomenon is based on the use of violence and an ideology that is religiously, racially or ethnically firmly determined. Terrorism as a crime in our legislation is one of the most serious crimes classified in the category of crimes against humanity and other goods protected internationally. What is considered a problem in the fight against terrorism is that even today there is no generally accepted understanding of what terrorism really is? This phenomenon, which is already gaining momentum today, is constantly advancing in every sense, and it is necessary to start finding a path that leads to controlling this phenomenon. By violating human rights and other material goods, terrorism threatens the global order.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Ezemenaka, Kingsley Emeka. "KIDNAPPING: A SECURITY CHALLENGE IN NIGERIA." Journal of Security and Sustainability Issues 8, no. 2 (December 29, 2018): 111–24. http://dx.doi.org/10.9770/jssi.2018.8.2(10).

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Garde, Hans J. "European security and the Baltic challenge." RUSI Journal 140, no. 2 (April 1995): 19–21. http://dx.doi.org/10.1080/03071849508445902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Maniatakos, Michail. "Guest Editor Introduction: Embedded Security Challenge." IEEE Embedded Systems Letters 10, no. 3 (September 2018): 81–82. http://dx.doi.org/10.1109/les.2018.2829765.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Sommaruga, Cornelio. "The global challenge of human security." Foresight 6, no. 4 (August 2004): 208–11. http://dx.doi.org/10.1108/14636680410554674.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Eide, Espen Barth. "The Internal Security Challenge in Kosovo." International Spectator 35, no. 1 (January 2000): 49–63. http://dx.doi.org/10.1080/03932720008458113.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Labuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (August 1, 2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.

Повний текст джерела
Анотація:
The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The Internet, however, holds many opportunities that could mean survival or competitive advantage for many organisations. To exploit these opportunities, it is important to first analyse the risks they hold. Electronic commerce is based on business as well as technological risks, making it a very difficult environment to secure. Apart from these two types of risk categories there are several other issues and problems that need to be addressed.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Hunter, Philip. "Security vendors tackle multi-gigabit challenge." Computer Fraud & Security 2007, no. 11 (November 2007): 14–15. http://dx.doi.org/10.1016/s1361-3723(07)70154-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Goucher, Wendy. "The challenge of security awareness training." Computer Fraud & Security 2009, no. 10 (October 2009): 15–16. http://dx.doi.org/10.1016/s1361-3723(09)70129-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Ashenden, Debi. "Information Security management: A human challenge?" Information Security Technical Report 13, no. 4 (November 2008): 195–201. http://dx.doi.org/10.1016/j.istr.2008.10.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Gold, Steve. "Meeting the biometrics payment security challenge." Biometric Technology Today 2013, no. 10 (November 2013): 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Dobbie, Stuart. "Challenge of biometric security for banks." Biometric Technology Today 2020, no. 3 (March 2020): 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30037-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Smith, Martin. "Facing the challenge of IT security." Computers & Security 14, no. 5 (January 1995): 423. http://dx.doi.org/10.1016/0167-4048(95)97134-v.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

ALBIN, CECILIA. "The Global Security Challenge to Negotiation." American Behavioral Scientist 38, no. 6 (May 1995): 921–48. http://dx.doi.org/10.1177/0002764295038006009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

AL-SUWAIDI, JAMAL S. "Gulf Security and the Iranian Challenge." Security Dialogue 27, no. 3 (September 1996): 277–94. http://dx.doi.org/10.1177/0967010696027003004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Miller, S. K. "Facing the challenge of wireless security." Computer 34, no. 7 (July 2001): 16–18. http://dx.doi.org/10.1109/2.933495.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Householder, A., K. Houle, and C. Dougherty. "Computer attack trends challenge Internet security." Computer 35, no. 4 (April 2002): sulp5—sulp7. http://dx.doi.org/10.1109/mc.2002.1012422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

WONG, John. "Food Security as a New Challenge in Asia." East Asian Policy 04, no. 02 (April 2012): 103–6. http://dx.doi.org/10.1142/s1793930512000207.

Повний текст джерела
Анотація:
All nations, big or small, are concerned with the issue of food security. Even for Singapore, which is almost 100% dependent on external food supply, it still has to face the challenges of maintaining a stable food supply. Food crisis can potentially emerge as a new challenge for regional security not just in Asia but also for the whole international community as well.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Adebayo, Nehemiah, Amos O. Bajeh, Micheal Arowolo, Erondu Udochuckwu, Kayode Jesujana, Mary Ajayi, Surajudeen Abdulrasaq, and John Onyemenam. "Blockchain Technology: A Panacea for IoT Security Challenge." EAI Endorsed Transactions on Internet of Things 8, no. 3 (October 4, 2022): e3. http://dx.doi.org/10.4108/eetiot.v8i3.1402.

Повний текст джерела
Анотація:
The Internet of Things (IoT) platforms, despite the wide range of application is not without loop holes of which cyberattackers can take advantage. In order to improve the platform's security while also increasing other features, it has been proposed that blockchain technology be implemented in any IoT system. However, while blockchain technology has many advantages, it is important to consider other options because they all have their own drawbacks that may not be ideal for every use case situation. IoT network devices have limited computer power, storage space, and bandwidth. As a result, these systems are easily prone to assault than other network connected devices, such PCs, cell phones and tablets. With focus on IoT security challenges and the countermeasures offered by the blockchain technology, consensus algorithm, data encryption and smart contracts were discovered to be the common and effective algorithm employed by the blockchain technology in securing Iot systems over time.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Paul, Pangkaj Chandra, John Loane, Fergal McCaffery, and Gilbert Regan. "Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications." Applied System Innovation 4, no. 4 (October 12, 2021): 76. http://dx.doi.org/10.3390/asi4040076.

Повний текст джерела
Анотація:
Assuring security and privacy of data is a key challenge for organizations when developing WBAN applications. The reasons for this challenge include (i) developers have limited knowledge of market-specific regulatory requirements and security standards, and (ii) there are a vast number of security controls with insufficient implementation detail. To address these challenges, we have developed a WBAN data security and privacy risk management framework. The goal of this paper is trifold. First, we present the methodology used to develop the framework. The framework was developed by considering recommendations from legislation and standards. Second, we present the findings from an initial validation of the framework’s usability and effectiveness of the security and privacy controls. Finally, we present an updated version of the framework and explain how it addresses the aforementioned challenges.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

GILL, PETER. "The Intelligence and Security Committee and the challenge of security networks." Review of International Studies 35, no. 4 (October 2009): 929–41. http://dx.doi.org/10.1017/s0260210509990362.

Повний текст джерела
Анотація:
AbstractA major feature of current security is the development of intelligence networks between agencies within and between nations and across public and private sectors. The performance of the UK Intelligence and Security Committee (ISC) is examined within this context, especially regarding allegations of collusion by UK agencies in rendition and torture. Proposed changes to the ISC are discussed and it is argued that the ISC must seek to leverage its limited powers by helping to construct an oversight network.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Jha, Shikha. "Impact of National Security Challenge in Development Prospect of South Asia." Unity Journal 3, no. 01 (March 6, 2022): 305–16. http://dx.doi.org/10.3126/unityj.v3i01.43334.

Повний текст джерела
Анотація:
National security has always been viewed as a precondition for sustainable economic, political, and social development. Any sort of challenges or threats upon national security directly infringes the developmental course. South Asia, has been rampantly facing security-related challenges and obstructions as terrorism, counter-terrorism, militarization, and religious extremism, civil war, and border disputes. Such challenges have not only jeopardized the peace within the region but a seething unrest has been pounded in the development process. This paper primarily focuses on national security challenges faced by countries in South Asia. South Asian nations resort to increment of defense budget, militarization, border security, and struggle for nuclear power to address their security challenge. I have examined the impact of such response upon the course of development in this paper. This is a qualitative research and refers to secondary source of data which includes; books, journals, reports of reputed institutes and think tanks. The analysis finds that increasing militarization and defense budget has been abysmal to address national security threat in South Asia. South Asian nations can resort to bilateral talks and diplomatic measure to address their security threats. This will save larger economic resources which could be utilized for development prospect.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Abd Ali, Shams Mhmood, Mohd Najwadi Yusoff, and Hasan Falah Hasan. "Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions." Future Internet 15, no. 1 (January 12, 2023): 35. http://dx.doi.org/10.3390/fi15010035.

Повний текст джерела
Анотація:
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions as crucial blockchain security. Nonetheless, the security function is currently being challenged due to improper data stored, such as child pornography, copyright violation, and lately the enaction of the “Right to be Forgotten (RtbF)” principle disseminated by the General Data Protection Regulation (GDPR), where it requires blockchain data to be redacted to suit current applications’ urgent demands, and even compliance with the regulation is a challenge and an unfeasible practice for various blockchain technology providers owing to the immutability characteristic. To overcome this challenge, mutable blockchain is highly demanded to solve previously mentioned issues, where controlled and supervised amendments to certain content within constrained privileges granted are suggested by several researchers through numerous blockchain redaction mechanisms using chameleon and non-chameleon hashing function approaches, and methods were proposed to achieve reasonable policies while ensuring high blockchain security levels. Accordingly, the current study seeks to thoroughly define redaction implementation challenges and security properties criteria. The analysis performed has mapped these criteria with chameleon-based research methodologies, technical approaches, and the latest cryptographic techniques implemented to resolve the challenge posed by the policy in which comparisons paved current open issues, leading to shaping future research directions in the scoped field.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Beck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, no. 1 (January 2017): 37–43. http://dx.doi.org/10.3141/2604-05.

Повний текст джерела
Анотація:
Smart city initiatives, which involve the connection and automation of city systems and services through the use of information and communication technology, offer significant opportunities to improve efficiency and address many environmental, economic, and social issues faced by U.S. cities. However, as systems become increasingly connected and automated, these systems and the people whom they serve become more vulnerable to an array of security threats, including cybersecurity attacks and attacks on the physical infrastructure and human lives. This paper focuses on how U.S. cities plan to mitigate and respond to the security risks that may arise from the integration of technology into transportation systems and connecting transportation system databases. After examining the U.S. Department of Transportation's recent competition Beyond Traffic: Smart City Challenge, this paper evaluates 32 of the 77 first-round applications to the Smart City Challenge submitted by midsize American cities. The paper provides a set of criteria to evaluate the resiliency of the applicants’ transportation systems, that is, the ability of the cities to withstand and respond to security threats and changing conditions. These criteria include the responses of cities to a range of security risks, the response to unknown risks, plans to accommodate risks, and whether cities plan to work with private or public partners to develop security mitigation and response strategies. The paper concludes that only 19 of the 32 first-round applications to the Smart City Challenge evaluated in this paper address security concerns related to the development of smart transportation systems, and the majority of cities with security plans focus only on mass cybersecurity risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

PEŠEC, MOJCA. "CHINA, SECURITY CHALLENGE FOR THE EUROPEAN UNION." KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (October 23, 2020): 15–30. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.1.

Повний текст джерела
Анотація:
Povzetek Strateško tekmovanje Evropske unije s Kitajsko je postalo povsem resnično. Kitajski vpliv v Evropi je ekonomski in geopolitičen. Kitajska je postala gospodarski tekmec, ki si prizadeva prevzeti vodilno mesto na področju razvoja tehnologij, želi pa tudi uveljavljati svoj model družbene ureditve in vladanja. Močnejša kitajska ekonomska prisotnost, kulturne in medijske aktivnosti ter dejavnosti vojaške diplomacije so orodja, s katerimi Kitajska uveljavlja svoj vpliv v odnosih z državami v Evropski uniji in v tistih na njenem obrobju. Najpomembnejši izzivi v odnosih med Kitajsko in Evropo so neuravnoteženost naložb v korist Kitajske, prevzemanje evropskih podjetij, predvsem tistih, ki upravljajo strateško pomembno infrastrukturo, ter povečana dejavnost kitajskih oboroženih sil v mednarodnem okolju. Ključne besede Evropska unija, Kitajska, strateško tekmovanje, varnostni izzivi. Abstract The European Union's strategic competition with China has become a reality. China's influence in Europe is both economic and geopolitical. China has become an economic competitor striving to take the lead in technology development, but it also wants to assert its model of social order and governance. China's stronger economic presence, cultural and media activities, and military diplomacy activities are tools with which China is asserting its influence in relations with countries in and around the European Union. The most important challenges in China-Europe relations are the imbalance of investment in favour of China, the takeover of European companies, especially those that manage strategically important infrastructure, and the increased activity of the Chinese armed forces in the international environment. Key words European Union, China, strategic competition, security challenges.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Trager, Robert F. "The Security Governance Challenge of Emerging Technologies." Orbis 66, no. 4 (2022): 536–50. http://dx.doi.org/10.1016/j.orbis.2022.08.008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Missiroli, Antonio. "European Security Policy: The Challenge of Coherence." European Foreign Affairs Review 6, Issue 2 (June 1, 2001): 177–96. http://dx.doi.org/10.54648/356609.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії