Trust management and security in the future communication-based" smart" electric power grid

J Fadul, K Hopkinson, C Sheffield…�- …�Hawaii International�…, 2011 - ieeexplore.ieee.org
… mitigate the growing energy demands on the United States (US) electric power grid. The …
in this trust management system to optimize the decision making process and minimize the …

[BOOK][B] Advances in Visual Computing: 4th International Symposium, ISVC 2008, Las Vegas, NV, USA, December 1-3, 2008, Proceedings

G Bebis - 2008 - books.google.com
… It is with great pleasure that we present the proceedings of the 4th International Symposium
on Visual Computing (ISVC 2008) in Las Vegas, Nevada. ISVC offers a common umbrella …

Non-profit Organizations' Need to Address Security for Effective Government Contacting

L Rice, S Rahman�- arXiv preprint arXiv:1512.00067, 2015 - arxiv.org
… There are many ways to address the security for IT departments. The … security policies and
procedures. The IT departments of small to medium companies have to address these security

Design and analysis of a dynamically configured log-based distributed security event detection methodology

MR Grimaila, J Myers, RF Mills…�- The Journal of�…, 2012 - journals.sagepub.com
US forces at risk because it exposes military tactics and procedures that could be exploited
by US … than 100 MB of web server content within a 24-hour period. Conceptually, this would …

[PDF][PDF] E-commerce systems security for small businesses

R Lackey�- International Journal of Network Security & Its�…, 2013 - Citeseer
… The Advanced Encryption Standard (AES) is the most current and most secure symmetric
encryption on the market. “After a lengthy process that required the cooperation of the US

Smart cards and digital security

JD Aussel�- …�Network Security: Fourth International Conference on�…, 2007 - Springer
Smart cards are portable tamper-resistant cryptographic devices that play a key role in
digital security. This paper reviews the latest use of smart cards in securing network, online …

Security, privacy and trust issues in smart environments

PA Nixon, W Wagealla, C English…�- Smart Environments�…, 2004 - Wiley Online Library
… principles of security that must underpin the whole process. … Many of us, depending on our
country of residence, never give … computing [5,2124] are encompassed in these guidelines. …

First use: introducing information security in high school oracle academy courses

RAH Stalvey, C Farkas…�- …�International Conference�…, 2012 - ieeexplore.ieee.org
… computing instead of a separate topic in and of itself [24, 25]. … injection, such as the trouble
in June 2011 with Sony when SQL … the process of making students aware of database security

[BOOK][B] Digital Information Processing and Communications: International Conference, ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011. Proceedings

V Snasel, J Platos, E El-Qawasmeh - 2011 - books.google.com
… Finally, we believe that the proceedings document the best research in the studied areas.
We express our thanks to the VSB Technical University of Ostrava, Czech Republic, Springer, …

Security projects for systems and networking professionals

L Deligiannidis, C Wiseman, M Yun…�- …�Trends in ICT Security, 2014 - Elsevier
security-oriented positions are filled either by security veterans or by fresh graduates who
have little or no working security … This is the general procedure for generating the associated …