慢慢流出 发表于 2025-3-25 05:27:34

https://doi.org/10.1007/1-4020-3714-7e when engaging in cyber trade. In terms of security, a similar paradigm shift needs to take place. In EC, security is no longer the protector, but has become the enabler. This article looks at what it takes to become EC-enabled and what the real security challenges are. Based on these challenges, t

性冷淡 发表于 2025-3-25 07:29:54

Citation Analysis in Research Evaluationial occurrence of business risks that could not be easily mitigated. Understanding that information security is not merely a technical solution implemented at each one of the endpoints of the inter-organizational application, this paper presents an integrated approach based on a rigorous multi-level

Armada 发表于 2025-3-25 13:21:16

http://reply.papertrans.cn/15/1484/148382/148382_23.png

CALL 发表于 2025-3-25 17:22:40

http://reply.papertrans.cn/15/1484/148382/148382_24.png

编辑才信任 发表于 2025-3-25 21:13:54

What do References and Citations Measure?ver, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe the SPEAR II graphically-based security protocol engineering environment that can be used to easily conduct GNY analyses. SPEAR II consis

Alienated 发表于 2025-3-26 00:16:48

http://reply.papertrans.cn/15/1484/148382/148382_26.png

美丽的写 发表于 2025-3-26 07:10:07

What do References and Citations Measure?anaging secure information systems (SIS) have been proposed. However, many of these approaches have shortcomings. These approaches lack fully comprehensive modeling schemes in terms of security, i.e. no single method covers all modeling needs. Rarely can these approaches be integrated into existing

合同 发表于 2025-3-26 11:41:35

http://reply.papertrans.cn/15/1484/148382/148382_28.png

macabre 发表于 2025-3-26 16:04:16

http://reply.papertrans.cn/15/1484/148382/148382_29.png

兽皮 发表于 2025-3-26 17:20:46

http://reply.papertrans.cn/15/1484/148382/148382_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Advances in Information Security Management & Small Systems Security; IFIP TC11 WG11.1/WG1 Jan H. P. Eloff,Les Labuschagne,Gurpreet Dhillon