scroll to top
Press enter or spacebar to select a desired language.
Press enter or spacebar to select a desired language.
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "SECURITY management"

1 - 10 of 123,514 results for
 "SECURITY management"
Press enter or spacebar to adjust the number of results displayed.


Publication Type: Academic Journal

Source(s): Environmental & Social Management Journal / Revista de Gestão Social e Ambiental. 2023, Vol. 17 Issue 6, p1-18. 18p.

Abstract: Objetivo: Identificar a realidade da cultura de segurança na The Hashemite University e o papel da universidade em sua promoção. Metodologia/design/abordagem: Foi usado o método de pesquisa descritiva e manipulado um questionário para a amostra aleatór...

KDM Security IBE Based on LWE beyond Affine Functions.

Publication Type: Academic Journal

Source(s): Applied Sciences (2076-3417). Jul2023, Vol. 13 Issue 14, p8259. 13p.

Abstract: Key-dependent message (KDM) security identity-based encryption (IBE) schemes aim to solve the security risks caused by the dependency between plaintext and secret keys in traditional IBE schemes. However, current KDM-IBE schemes are only secure with re...

Discussion on Risk Factors of Stadium: A Case Study of Taipei Dome Complex †.

Publication Type: Academic Journal

Source(s): Engineering Proceedings. 2023, Vol. 38, p22. 7p.

Abstract: The Taipei Dome Complex is located in Taipei, Taiwan. It is a composite park with a multi-functional dome and incorporates a shopping mall, restaurants, cinemas, and an office building. In 2017, Taipei, Taiwan hosted the Universiade, and thousands of p...

Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures.

Publication Type: Academic Journal

Source(s): Applied Sciences (2076-3417). Feb2023, Vol. 13 Issue 4, p2349. 30p.

Abstract: Identity management ensures that users have appropriate access to resources, such as ICT services and data. Thereby, identity management does not only identify, authenticate, and authorize individuals, but also the hardware devices and software applica...

Enhancing Microservices Security with Token-Based Access Control Method.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Mar2023, Vol. 23 Issue 6, p3363. 21p.

Abstract: Microservices are compact, independent services that work together with other microservices to support a single application function. Organizations may quickly deliver high-quality applications using the effective design pattern of the application func...

Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements.

Publication Type: Academic Journal

Source(s): Quantum Reports. Mar2023, Vol. 5 Issue 1, p52-77. 26p.

Abstract: Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically ...

Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Feb2023, Vol. 23 Issue 4, p1755. 27p.

Abstract: Security is a significant priority for cloud-native systems, regardless of the system size and complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect the system from exploitation by potential adversaries. There is ...

A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments.

Publication Type: Academic Journal

Source(s): Electronics (2079-9292). Feb2023, Vol. 12 Issue 4, p1011. 20p.

Abstract: Wireless sensor networks (WSNs) have developed during the past twenty years as a result of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN technology sends the real-time sense information of a specific monitoring envi...

On the Security of Offloading Post-Processing for Quantum Key Distribution.

Publication Type: Academic Journal

Source(s): Entropy. Feb2023, Vol. 25 Issue 2, p226. 18p.

Abstract: Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging because of the very particular nature of QKD and its ph...

Feminist Commitments Towards a Horizontal Women, Peace, and Security Critical Learning Community.

Publication Type: Academic Journal

Source(s): International Studies Review. Sep2023, Vol. 25 Issue 3, p1-19. 19p. 1 Color Photograph.

Abstract: This paper features the process whereby an experimental Women, Peace, and Security (WPS) program fostered a critical learning community around peace and security across 13 countries and with 40 women. It addresses the epistemological questions of doing...