• Aucun résultat trouvé

Security and Protection

Partial Employment Protection and Perceived Job Security: Evidence from France

Partial Employment Protection and Perceived Job Security: Evidence from France

... employment protection on workers’ self-assessed job ...employees, and as such provides a natural quasi-experiment that can be analysed via difference-in-difference ...creation and perceived ...

36

Bus-based MPSoC security through communication protection: A latency-efficient alternative

Bus-based MPSoC security through communication protection: A latency-efficient alternative

... latency and memory consumption is mandatory when building secu- rity mechanisms to meet implementation requirements while guaranteeing an efficient protection against ...memories and ...

9

Controlling Irregular Migration in Canada: Reconciling Security Concerns with Human Rights Protection

Controlling Irregular Migration in Canada: Reconciling Security Concerns with Human Rights Protection

... goods and people, while reinforcing security around the three ...that security integration is taking place, despite Canada’s refusal to join the American antimissile program, the con- sequences of ...

44

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

... monitoring and controlling the different subsystems of a car, are interconnected through several gate- ways and compose the global internal network of the ...world and can be seen as entry points for ...

13

Privacy and Security in E-Learning

Privacy and Security in E-Learning

... Approaches for Network Privacy A number of approaches have been developed to provide the level of safeguarding for network privacy that is required in the company example above, in which the company needs to keep its ...

21

Employment Protection and Migration

Employment Protection and Migration

... insiders and outsiders, but also with their bargaining ...employment protection increases the total labor income for ...Garibaldi and Violante (2005) argue that workers face a trade-off between their ...

37

Semantics and Security Issues in JavaScript

Semantics and Security Issues in JavaScript

... We have seen that the window object is key to data privacy protection. Never- theless, we have pointed out how JavaScript exposes window to the entire environ- ment constraining any security approach. We ...

40

Security in Cloud Computing: Evaluation and Integration

Security in Cloud Computing: Evaluation and Integration

... its security requirements, the CSP should ensure security satisfaction during the whole service lifetime and avoid Security- SLA ...infrastructure and on other infrastructures in case ...

261

Security Mechanisms Planning to Enforce Security Policies

Security Mechanisms Planning to Enforce Security Policies

... Many security-related research issues associated with data outsourcing have been studied focusing on data confidentiality [2, 12], data authentication and integrity [15, 16], Copyright protection ...

17

Security and privacy in online social networks

Security and privacy in online social networks

... Parmi les approches actuelles de DOSNs basés sur P2P, aucun d'entre eux répond à ce problème. En outre, les DOSNs P2P actuels se basent souvent sur des architectures P2P existantes et sourent des problèmes bien connus ...

230

RFID Security and Privacy

RFID Security and Privacy

... privacy and data protection principles in applications supported by radio-frequency identification”, which is designed to provide “guidance to Member States on the design and operation of RFID ...

15

Watermarking security

Watermarking security

... ∆ and F denotes the typical amplitude of features, then there are (F /∆) n f points to be ...features, and it does not lead to a tractable oracle attack in ...

31

A Security Ontology for Security Requirements Elicitation

A Security Ontology for Security Requirements Elicitation

... of security makes it possible to predict threats and their impacts and define adequate security requirements before the system is in ...place. Security requirements are difficult to ...

22

Trading and rational security pricing bubbles

Trading and rational security pricing bubbles

... issuance and discuss its implications (both in the equity and the debt ...the security price (raise the interest paid on ...agreements and running a Ponzi ...bubbles and specialness as ...

38

Oldrich Bures, Private Security Companies. Transforming Politics and Security in the Czech Republic

Oldrich Bures, Private Security Companies. Transforming Politics and Security in the Czech Republic

... transformed security – through their offer and practices, and in the absence of the State − into a private, excludable, rival and a-political good available on a ...of security is ...

5

Security Transitions

Security Transitions

... the security transition on conflict dynamics using ex- ceptionally granular ...ISAF and host nation forces was set up to track significant activities, referred to as ...geotagged and timestamped, ...

79

Security monitoring for network protocols and applications

Security monitoring for network protocols and applications

... user and poison the user’s Internet browsers in order to change User-Agent strings or maybe perform a MiM (Man in the Middle) attack and alter HTTP headers via ...X and Mocha. It must be noted that ...

130

Machine Learning and Statistical Verification for Security

Machine Learning and Statistical Verification for Security

... system and to ensure its safeness from any upcoming potential threat one should learn the dependencies and behavior of the different components of the system, identify malicious ones and act at the ...

139

Security and privacy in automotive on-board networks

Security and privacy in automotive on-board networks

... The main contributions of this thesis are i an approach to securing the communication of in-vehicle networks, ii an approach to applying dynamic data flow analysis to the distributed emb[r] ...

226

Security and privacy issues in cloud computing

Security and privacy issues in cloud computing

... Farooqi and Farrukh Aslam Khan presents the approach by modifying the low-energy adaptive clustering hierarchy (LEACH) protocol for wireless sensor networks (WSNs) and adding the functionality of intrusion ...

4

Show all 10000 documents...

Sujets connexes