找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Human Aspects of Information Security, Privacy, and Trust; 4th International Co Theo Tryfonas Conference proceedings 2016 Springer Internat

[复制链接]
楼主: Filament
发表于 2025-3-23 11:36:32 | 显示全部楼层
发表于 2025-3-23 14:07:03 | 显示全部楼层
Anonymous Authentication with a Bi-directional Identity Federation in the Cloud. In the cloud architecture, user space may be shared across various resources, leading to possible data exposure, and making mapping of users and their privileges a challenging job. Moreover the user has to keep track of many passwords and tokens for different applications. In many setting, anonymi
发表于 2025-3-23 18:07:54 | 显示全部楼层
发表于 2025-3-24 01:01:21 | 显示全部楼层
发表于 2025-3-24 04:10:18 | 显示全部楼层
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perthe software lifecycle, focusing on the early design phase and mitigating privacy risks. As a departure point, we used Personal Health Information Act (PHIA) in Nova Scotia to derive the following five proposed privacy patterns: 1-request an access 2-request a correction 3-request not to disclose Pe
发表于 2025-3-24 08:29:13 | 显示全部楼层
Information Security Application Design: Understanding Your Usersonal methods of creating Personas are time-consuming. In this work, members of the Rapid7 User Experience team illustrate how they have quickly created Personas using the Proto-Persona method. The method, which encapsulates a collective set of beliefs that an organization has about their users, enab
发表于 2025-3-24 11:14:33 | 显示全部楼层
Responsibility Modelling and Its Application Trust Managementt trust can be measured in-terms of reliability and dependability, while from a socio standpoint trust can be viewed as (a) the Need to trust, trust based on Identification, trust based on Competence and finally trust based on Evidence. In this paper we will develop a socio-technical model of trust
发表于 2025-3-24 16:16:47 | 显示全部楼层
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksof human behaviour, based on relevant theories like deterrence theory and the theory of planned behaviour. We conduct a survey of IT professionals, managers and employees of selected banks from Nigeria as part of a sector case study focussed in this region. Our findings suggest that security by comp
发表于 2025-3-24 22:37:41 | 显示全部楼层
Current Trend of End-Users’ Behaviors Towards Security Mechanismsare being rapidly modified sophisticatedly. Consequently, end-users’ behaviors are being changed, newly developed, and/or innovated as a result of the modifications of the mechanisms. Therefore, tracing the change of the end-user’s security related behaviors is an essential activity that should get
发表于 2025-3-24 23:16:56 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 01:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表