EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"system security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 10 Datensicherheit 9 Computer System Security 8 System Security 3 System security 3 Theorie 3 Theory 3 information system security 3 survey 3 system security 3 Access Control 2 Authorisation Model 2 Betriebliches Informationssystem 2 Business intelligence system 2 Digital Rights Management 2 Information Security 2 Information system 2 Information system security 2 Informationssystem 2 Innovation adoption 2 Innovationsakzeptanz 2 Internet 2 Power system security 2 Seed system 2 actor-orientation 2 human activity system 2 information security 2 perceived system security 2 privacy 2 seed policy 2 seed system security 2 technology acceptance 2 university students 2 Access Control System 1 Access control 1 Air pollution 1 Algorithm 1 Algorithmus 1 Application Security 1 Australia 1
more ... less ...
Online availability
All
Free 17 Undetermined 12
Type of publication
All
Article 26 Book / Working Paper 5
Type of publication (narrower categories)
All
Article in journal 10 Aufsatz in Zeitschrift 10 Congress Report 6 Working Paper 3 Arbeitspapier 2 Graue Literatur 2 Non-commercial literature 2 research-article 2 Article 1 Konferenzschrift 1
more ... less ...
Language
All
English 22 Undetermined 8 French 1
Author
All
Salim, Farzad 4 Dawson, Edward 3 Christinck, Anja 2 Djedovic, Irfan 2 Kergna, Alpha 2 Mulinge, Wellington 2 Rattunde, Fred 2 Reid, Jason F. 2 Safavi-Naini, Rei 2 Sheppard, Nicholas P. 2 Weltzien, Eva 2 Özlen, Muhammed Kürşad 2 Albashrawi, Mousa Ahmed 1 Albu, Lucian-Liviu 1 Balasubramanian, Sandhya 1 Bancheş, Eugen 1 Baxter, Arden 1 Bernales, Alejandro 1 Biplob, Ray 1 Bourassa Forcier, Mélanie 1 COSMA, Mircea 1 Chowdhury, Morshed U. 1 Curtis, Mary B. 1 Daniel, Charles-Étienne 1 Dianconu, Daniela 1 Dinu, Sorin 1 Dubois, Eric 1 Dulleck, Uwe 1 Eggert, Axel 1 Fleischman, Gary M. 1 Foley, A.M. 1 Genon, Nicolas 1 Heymans, Patrick 1 Inzunza, Andrés 1 Iordan, Marioara 1 Ji, Song 1 Jøsang, Audun 1 Katt, Basel 1 Kaye, RJ 1 Kim, Geunhye 1
more ... less ...
Institution
All
International Conference on Technological Advancement in Embedded and Mobile Systems <1., 2022, Arusha> 1
Published in...
All
Alma Mater University journal 1 Baltic Journal of Economic Studies 1 Business & society 1 Cahier scientifique 1 Energy 1 Energy economics 1 European journal of operational research : EJOR 1 INFORMS journal on optimization 1 Information & Computer Security 1 International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 1 International journal of enterprise information systems : an official publication of the Information Resources Management Association 1 International journal of services technology and management 1 Journal of Accounting and Management Information Systems (JAMIS) 1 Journal of Consumer Marketing 1 Journal of accounting & management information systems : JAMIS 1 Management information systems : mis quarterly 1 Progress in IS 1 Romanian journal of economic forecasting 1 ZEF Working Paper Series 1 ZEF working paper series 1
more ... less ...
Source
All
ECONIS (ZBW) 14 BASE 10 Other ZBW resources 3 EconStor 2 RePEc 2
Showing 21 - 30 of 31
Cover Image
Towards a game theoretic authorisation model
Salim, Farzad; Reid, Jason; Dulleck, Uwe; Dawson, Edward - 2010
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
Saved in:
Cover Image
Critical supply chain systems and critical infrastructure protection
Warren, Matthew; Leitch, Shona - 2010
Secure management of Australia's commercial critical infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the government. It is currently managed through high-level information sharing via collaboration but does this situation suit the commercial...
Persistent link: https://www.econbiz.de/10009483703
Saved in:
Cover Image
Mutual authentication with malware protection for a RFID system
Biplob, Ray; Chowdhury, Morshed U.; Pham, Thao - 2010
Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can...
Persistent link: https://www.econbiz.de/10009483982
Saved in:
Cover Image
Commitment issues in delegation process
Pham, Quan; Reid, Jason F.; McCullagh, Adrian; Dawson, … - 2008
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been...
Persistent link: https://www.econbiz.de/10009437840
Saved in:
Cover Image
Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development
Matulevicius, Raimundas; Mayer, Nicolas; Mouratidis, … - 2008
Security is a major target for today’s information systems (IS) designers. Security modelling languages exist to reason on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analysing risk, and effectively...
Persistent link: https://www.econbiz.de/10009463265
Saved in:
Cover Image
Information system security insurance
COSMA, Mircea; TATU, Alexandru; TATU, Alexandru - In: Alma Mater University journal 7 (2014) 1, pp. 46-51
Through this paper we intend to show that technological developments in recent decades have created a strong society dependence of the means of communication and information technology. This has been increasingly made aware to ordinary people, but also military and political leaders. Increasing...
Persistent link: https://www.econbiz.de/10010837111
Saved in:
Cover Image
Enforcing P3P policies using a digital rights management system
Salim, Farzad; Sheppard, Nicholas P.; Safavi-Naini, Rei - 2007
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are...
Persistent link: https://www.econbiz.de/10009438034
Saved in:
Cover Image
Signal authentication and integrity schemes for next generation global navigation satellite systems
Wullems, Christian; Pozzobon, Oscar; Kubik, Kurt - 2005
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including...
Persistent link: https://www.econbiz.de/10009438385
Saved in:
Cover Image
Wind generation output during cold weather-driven electricity demand peaks in Ireland
Leahy, P.G.; Foley, A.M. - In: Energy 39 (2012) 1, pp. 48-53
Recent cold winters and prolonged periods of low wind speeds have prompted concerns about the increasing penetration of wind generation in the Irish and other northern European power systems. On the combined Republic of Ireland and Northern Ireland system there was in excess of 1.5 GW of...
Persistent link: https://www.econbiz.de/10011053530
Saved in:
Cover Image
Relationship between intangibility and perceived risk: moderating effect of privacy, system security and general security concerns
Vinhal Nepomuceno, Marcelo; Laroche, Michel; Richard, … - In: Journal of Consumer Marketing 29 (2012) 3, pp. 176-189
also investigated the moderating effects of privacy, system security and general security concerns when purchasing in an … information are processed simultaneously (i.e. product intangibility and privacy concern). Furthermore, system security was …, system security concerns, general security concerns for those purchasing in online environments.  …
Persistent link: https://www.econbiz.de/10014848953
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...