Showing 1 - 10 of 28
Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements...
Persistent link: https://www.econbiz.de/10009416786
Approaches of data analysis in the context of Business Intelligence solutions are presented, when the data is scarce with respect to the needs of performing an analysis. Several scenarios are presented: usage of an initial dataset obtained from primary data as a reference for the quality of the...
Persistent link: https://www.econbiz.de/10011145576
High security must be a primary and permanent concern of the leadership of an organization and it must be ensured at … any time. For this, a risk analysis is compulsory and imperative to be done during the risk management cycle. Security … risk analysis and security risk management components mostly use estimative data during the whole extensive process. The …
Persistent link: https://www.econbiz.de/10011132258
security risks, as well as methods of enhancing security, are detailed by DIA architectural features. The analysis includes … model based on a qualitative assessment of DIA security features, obtained through an inquiry in the common means of …
Persistent link: https://www.econbiz.de/10011132266
systems through information security is described. Risks arise from system complexity, thus evaluation and comparison of …
Persistent link: https://www.econbiz.de/10010592516
is shown as well the design of the cadastral software application. The online solution for the security management in the … vulnerability for the future processes, which gather all the functionality of the security system. It will be determined all the … functions and new functionalities of the security management solution for the cadastral system. The future system will assure …
Persistent link: https://www.econbiz.de/10009416285
and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at …
Persistent link: https://www.econbiz.de/10009416286
The paper presents the main aspects regarding the development of the information security and assurance of their … security. The information systems, standards and audit processes definitions are offered. There are presented the most … important security standards used in information system security assessment …
Persistent link: https://www.econbiz.de/10009416378
The informatics security concept is defined. For informatics applications which have a classical structure, the …-applications. Metrics are built for the security of open informatics applications and a method for their validation is proposed. To see when …
Persistent link: https://www.econbiz.de/10009416380
The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation method and a genetic algorithm based training. The design of these algorithms is presented. A...
Persistent link: https://www.econbiz.de/10009416400