標(biāo)題: Titlebook: ISSE 2011 Securing Electronic Business Processes; Highlights of the In Norbert Pohlmann,Helmut Reimer,Wolfgang Schneider Book 2011 Vieweg+T [打印本頁(yè)] 作者: ARSON 時(shí)間: 2025-3-21 19:15
書目名稱ISSE 2011 Securing Electronic Business Processes影響因子(影響力)
書目名稱ISSE 2011 Securing Electronic Business Processes影響因子(影響力)學(xué)科排名
書目名稱ISSE 2011 Securing Electronic Business Processes網(wǎng)絡(luò)公開度
書目名稱ISSE 2011 Securing Electronic Business Processes網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱ISSE 2011 Securing Electronic Business Processes被引頻次
書目名稱ISSE 2011 Securing Electronic Business Processes被引頻次學(xué)科排名
書目名稱ISSE 2011 Securing Electronic Business Processes年度引用
書目名稱ISSE 2011 Securing Electronic Business Processes年度引用學(xué)科排名
書目名稱ISSE 2011 Securing Electronic Business Processes讀者反饋
書目名稱ISSE 2011 Securing Electronic Business Processes讀者反饋學(xué)科排名
作者: 障礙物 時(shí)間: 2025-3-21 20:52 作者: AND 時(shí)間: 2025-3-22 02:46
The new German ID Card: An Innovative System Gains AcceptanceIntroduction of the new ID card in Germany on 1 November 2010 also marked the start of one of the world’s largest IT projects. In the meantime, around 6 million of these state-of-the-art multifunction cards are in circulation, and the infrastructures created for the new online ID function are rapidly becoming established on the market.作者: Carbon-Monoxide 時(shí)間: 2025-3-22 06:12 作者: 調(diào)色板 時(shí)間: 2025-3-22 12:43 作者: 商談 時(shí)間: 2025-3-22 15:44
From Trusted Cloud Infrastructures to Trustworthy Cloud Services compliance in enterprises. The cloud model of “Infrastructure as a Service” (IaaS), combined with the trusted components proposed in this paper and researched in actual EU and Germany-wide cloud computing projects is a big chance for higher security in enterprises, especially for SMEs.作者: 敵手 時(shí)間: 2025-3-22 21:02 作者: 東西 時(shí)間: 2025-3-22 21:37 作者: irreducible 時(shí)間: 2025-3-23 05:14 作者: conjunctivitis 時(shí)間: 2025-3-23 06:25
978-3-8348-1911-6Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH, Wiesbaden 2011作者: antenna 時(shí)間: 2025-3-23 10:43
Proof, not Promises: Creating the Trusted Cloudeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. Why? Because clouds and virtualization irrevocably change the nature of control and visibility. Infrastructure becomes virtual, not physical. People access infrastructure 作者: aphasia 時(shí)間: 2025-3-23 17:41
How Cloud Security Strongly Depends on Process Maturity, Automation and Scaled access control. But only a few of them know the processes inside a data centre needed to produce scalable, dynamic and flexible ICTservices on large scale. The essential elements here are centralization and consequent re-use, virtualization on all levels of the ICT stack, as well as interoperabili作者: Firefly 時(shí)間: 2025-3-23 21:57 作者: Predigest 時(shí)間: 2025-3-24 01:54 作者: 共同確定為確 時(shí)間: 2025-3-24 02:28 作者: dry-eye 時(shí)間: 2025-3-24 06:30
Information Security Awareness Campaign “Sicher gewinnt!”: A Joint Action of the German Federal Admimprovement of the technical security measures shifts humans more and more into the target of attackers in order to compromise the information assets of an organization. High personal awareness of information security risks and well-trained security managers therefore constitute the first line of inf作者: 朝圣者 時(shí)間: 2025-3-24 12:38
Pebkac revisited – Psychological and Mental Obstacles in the Way of Effective Awareness Campaignsed them did not pay attention to some very special human factors which make it difficult to change the behavior of certain target groups within an organization intentionally. This article discusses three of them: Memes, reactance and heuristics.作者: 山間窄路 時(shí)間: 2025-3-24 18:09 作者: 加劇 時(shí)間: 2025-3-24 19:09 作者: Myofibrils 時(shí)間: 2025-3-25 01:23 作者: 鎮(zhèn)壓 時(shí)間: 2025-3-25 05:35
Consumerization: Consequences of Fuzzy Work-Home Boundariesalyze representative threats connected with consumerization as well as some of the common consumerization scenarios and discuss architectures and other mitigation approaches that can help address the issues associated with consumerization in the current and future generations of computing devices. W作者: 一再困擾 時(shí)間: 2025-3-25 09:22
Smart Grid Privacy by Design: Ontario’s Advanced Distribution System Grid systems. In Ontario, Canada, Hydro One is the largest electricity transmission and distribution company and already has an advanced metering infrastructure in place along with over 1 million smart meters deployed across its rural and suburban service area. The next logical step for Hydro One i作者: POWER 時(shí)間: 2025-3-25 15:28
How to have the cake and eat it, too: Protecting Privacy and Energy Efficiency in the Smart Grid. This risk has shown to have a significant impact, and in some countries, privacy concerns have already caused a pushback that has significantly delayed smart grid deployment as well as increased deployment costs. In this paper we describe how much of the privacy risk can be mitigated, without hamp作者: Magnitude 時(shí)間: 2025-3-25 19:39 作者: 投票 時(shí)間: 2025-3-25 22:21
ethod is proposed, and the method is based on a representative input inventory for tunnel excavation and lining construction. The modules include the stages of material production, material transportation, on-site construction, collection, and processing. Moreover, the modules were divided based on 作者: SHRIK 時(shí)間: 2025-3-26 00:34 作者: 大炮 時(shí)間: 2025-3-26 08:23 作者: DAMP 時(shí)間: 2025-3-26 08:55 作者: 蕨類 時(shí)間: 2025-3-26 14:06 作者: 憤怒事實(shí) 時(shí)間: 2025-3-26 17:12
Christian Senk,Andreas Holzapfelll the key techniques in the manufacturing and modification..This book contains eight chapters that discuss the manufacturing methods, surface treatment, composite interfaces, microstructure-property relationships with underlying fundamental physical and mechanical principles, and applications of ca作者: 逢迎春日 時(shí)間: 2025-3-26 21:55
Morten J?rsumour was improved significantly. Therefore this type of carbon material has been identified as most suitable for the application in rocket nozzles, exit cones, wing leading edges and nose cap of the shuttle, as well as break discs and liners of aircrafts. An increasing emphasis originates by the mate作者: octogenarian 時(shí)間: 2025-3-27 01:10
Martin Raeppleour was improved significantly. Therefore this type of carbon material has been identified as most suitable for the application in rocket nozzles, exit cones, wing leading edges and nose cap of the shuttle, as well as break discs and liners of aircrafts. An increasing emphasis originates by the mate作者: Exterior 時(shí)間: 2025-3-27 08:20
Michael Gr?ne,Norbert Schirmern monoxide, hydrocarbons...) flow or stay over a metallic surface which does not present the conditions necessary for their thermodynamic stability. The specific conditions in which these filaments have grown to macroscopic dimensions have occasionally been accidentally attained. Thus the “chemical 作者: Hamper 時(shí)間: 2025-3-27 11:48 作者: 敵手 時(shí)間: 2025-3-27 16:53 作者: NEG 時(shí)間: 2025-3-27 18:16 作者: Presbycusis 時(shí)間: 2025-3-28 00:28
James Clarke,John C. Malleryitions but also, importantly, on the national political context and, increasingly, on the international environment. This technological choice carries with it the genetic code of the nation‘s future development. Many developing countries which lack the needed infrastructure do not have real options;作者: Missile 時(shí)間: 2025-3-28 06:06
Vaclav Jirovskys of high thermal stability have proceeded at an amazing rate. Those familiar with the early literature in this area are still fascinated by the many elegant synthetic routes to high temperature high polymers, examples of which are the polybenzimidazoles, polyoxadiazoles, polybenzothiazoles and poly作者: Harridan 時(shí)間: 2025-3-28 10:18
nsider what factors led to the development of composites. Structural designs are as likely to be limited by the stiffness as by the strength of the construction material. Hence, engineers have always desired suffer, stronger, less dense and lower cost structural materials. There are a number of mate作者: hurricane 時(shí)間: 2025-3-28 10:54
Ulrich Lang,Rudolf Schreinerhe subject of relatively intense research over the past twenty-five years due to the promise of achieving physical properties approaching single crystal graphite in the form of an inexpensive carbon filament. Production of VGCF on a commercial scale has lagged behind expectations for a material with作者: RECUR 時(shí)間: 2025-3-28 17:16 作者: 字的誤用 時(shí)間: 2025-3-28 18:56 作者: 該得 時(shí)間: 2025-3-29 02:16
Klaus Kursawewaste (MSW) are produced annually, which are expected to upsurge by two folds in 2050, thereby raising a matter of concern in future. The chapter aims to assess the greenhouse gas (GHG) emissions from MSW management and its subsequent impacts on socioeconomic status of people and ecological systems.作者: fabricate 時(shí)間: 2025-3-29 05:46 作者: projectile 時(shí)間: 2025-3-29 10:04
es. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.978-3-8348-1911-6978-3-8348-8652-1作者: blithe 時(shí)間: 2025-3-29 13:59 作者: convulsion 時(shí)間: 2025-3-29 19:39
Building a Long Term Strategy for International Cooperation in Trustworthy ICTs, and initial planning considerations for international collaboration on R&D towards trustworthy ICT and, as part of that, to explore international cooperation required within Frameworks for Data Exchange, as a specific enabler for collective defence and response to cyber attacks.作者: 完成才能戰(zhàn)勝 時(shí)間: 2025-3-29 20:24
Book 2011nic business processes. .The topics include:.- Cloud Computing & Enterprise Security Services.- Awareness, Education, Privacy & Trustworthiness.- Smart Grids, Mobile & Wireless Security.- Security Management, Identity & Access Management.- eID & eGovernment.- Device & Network Security.Adequate infor作者: aviator 時(shí)間: 2025-3-30 00:07 作者: 同位素 時(shí)間: 2025-3-30 06:40
Information Security Awareness Campaign “Sicher gewinnt!”: A Joint Action of the German Federal Admiormation security defence. To achieve this aim, a significant change in user perception and the establishment of an organizational information security awareness culture are necessary. This includes the users’ comprehension and application of information security measures in an effortless and intuitional way.作者: 冒號(hào) 時(shí)間: 2025-3-30 11:38
How to have the cake and eat it, too: Protecting Privacy and Energy Efficiency in the Smart Gridering the business case or causing significant extra costs. By using modern Privacy Enhancing Technologies, it is possible to create a win-win situation, where both the business use case and the privacy protection profit at the same time.作者: 高腳酒杯 時(shí)間: 2025-3-30 13:09
Book 2011mation security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.作者: GET 時(shí)間: 2025-3-30 17:55 作者: 混雜人 時(shí)間: 2025-3-31 00:23
Proof, not Promises: Creating the Trusted Cloudere sensitive information resides. And with an IT infrastructure that is virtual and shared via the cloud, organizations must learn new ways to achieve visibility into risks, threats, and compliance performance. The good news is forward-thinking businesses can clear these hurdles today.作者: 分貝 時(shí)間: 2025-3-31 02:39 作者: 下船 時(shí)間: 2025-3-31 06:57 作者: 鴕鳥 時(shí)間: 2025-3-31 12:42 作者: AXIS 時(shí)間: 2025-3-31 16:20
their applications. Furthermore, it addresses the effect of graphene and carbon nanotubes on the physical and chemical properties of carbon fibers.? A final chapter looks at the emerging and future prospects for carbon fiber technology..978-981-13-4445-9978-981-13-0538-2Series ISSN 0933-033X Series E-ISSN 2196-2812