Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

2 3 4 5 6
hits: 351
31.
  • Security Risk Management in... Security Risk Management in E-commerce Systems: A Threat-driven Approach
    Abasi-amefon O., Affia; Matulevicius, Raimundas; Nolte, Alexander Baltic Journal of Modern Computing, 2020, Volume: 8, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    E-commerce has transformed the commerce industry as we know it, introducing better purchasing, shipping, and customer services. These business services generate and utilise sensitive information such ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
32.
  • On ISSM and leveraging the ... On ISSM and leveraging the Cloud towards faster quantification of the uncertainty in ice-sheet mass balance projections
    Larour, E.; Schlegel, N. Computers & geosciences, November 2016, 2016-11-00, 20161101, Volume: 96
    Journal Article
    Peer reviewed

    With the Amazon EC2 Cloud becoming available as a viable platform for parallel computing, Earth System Models are increasingly interested in leveraging its capabilities towards improving climate ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
33.
  • MODEL OF SECURITY LEVEL CLA... MODEL OF SECURITY LEVEL CLASSIFICATION FOR DATA IN HYBRID CLOUD COMPUTING
    Shakir, Mohanaad; Abubakar, Asmidar; Yousoff, Younus ... Journal of Theoretical and Applied Information Technology, 12/2016, Volume: 94, Issue: 1
    Journal Article

    Organizations mainly rely on data and the mechanism of dealing with that data on cloud computing. Data in an organization has multi security levels, which is classified depending on nature of the ...
Full text
Available for: NUK, UL, UM, UPUK
34.
  • IMPROVEMENT KEYS OF ADVANCE... IMPROVEMENT KEYS OF ADVANCED ENCRYPTION STANDARD (AES) RIJNDAEL_M
    Shakir, Mohanaad; Abubakar, Asmidar Bit; Yousoff, Younus Bin ... Journal of Theoretical and Applied Information Technology, 04/2016, Volume: 86, Issue: 2
    Journal Article

    Rijndael is a specification for the encryption of electronic data that considered as a collection of ciphers with distinct block and key sizes. This study aims to develop the key of Rijndael cipher ...
Full text
Available for: NUK, UL, UM, UPUK
35.
  • Survey on Key Technology De... Survey on Key Technology Development and Application in Trusted Computing
    Wang, Juan; Shi, Yuan; Peng, Guojun ... China communications, 11/2016, Volume: 13, Issue: 11
    Journal Article
    Peer reviewed

    Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network ...
Full text
Available for: IJS, NUK, UL
36.
  • Analysis of vulnerability a... Analysis of vulnerability assessment results based on CAOS
    Corral, G.; Garcia-Piquer, A.; Orriols-Puig, A. ... Applied soft computing, 10/2011, Volume: 11, Issue: 7
    Journal Article
    Peer reviewed

    Information system security must battle regularly with new threats that jeopardize the protection of those systems. Security tests have to be run periodically not only to identify vulnerabilities but ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
37.
  • APPLICATION OF CONFIDENCE R... APPLICATION OF CONFIDENCE RANGE ALGORITHM IN RECOGNIZING USER BEHAVIOR THROUGH EPSB IN CLOUD COMPUTING
    Shakir, Mohanaad; Abubakar, Asmidar Bit; Yousoff, Younus ... Journal of Theoretical and Applied Information Technology, 12/2016, Volume: 94, Issue: 2
    Journal Article

    Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from ...
Full text
Available for: NUK, UL, UM, UPUK
38.
Full text
Available for: NUK, UL, UM

PDF
39.
  • Security Attack Testing (SA... Security Attack Testing (SAT)—testing the security of information systems at design time
    Mouratidis, Haralambos; Giorgini, Paolo Information systems (Oxford), 12/2007, Volume: 32, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number of languages, ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
40.
Full text

PDF
2 3 4 5 6
hits: 351

Load filters