Resultado de la búsqueda
11 búsqueda de la palabra clave 'Security'




Título : Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry Tipo de documento: documento electrónico Autores: Schapranow, Matthieu-P ; SpringerLink (Online service) Editorial: Berlin, Heidelberg : Springer Berlin Heidelberg Fecha de publicación: 2014 Otro editor: Imprint: Springer Colección: In-Memory Data Management Research Número de páginas: XXII, 146 p Il.: online resource ISBN/ISSN/DL: 978-3-642-36343-6 Idioma : Inglés (eng) Palabras clave: Business Information technology Data processing Computer organization Software engineering security structures (Computer science) Computers and Management IT in Systems Organization Communication Networks Security Engineering/Programming Operating Structures Service Clasificación: 658 Empresas. Organización de empresas Resumen: The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture Nota de contenido: Introduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices En línea: http://dx.doi.org/10.1007/978-3-642-36343-6 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=36118 Real-time Security Extensions for EPCglobal Networks : Case Study for the Pharmaceutical Industry [documento electrónico] / Schapranow, Matthieu-P ; SpringerLink (Online service) . - Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014 . - XXII, 146 p : online resource. - (In-Memory Data Management Research) .
ISBN : 978-3-642-36343-6
Idioma : Inglés (eng)
Palabras clave: Business Information technology Data processing Computer organization Software engineering security structures (Computer science) Computers and Management IT in Systems Organization Communication Networks Security Engineering/Programming Operating Structures Service Clasificación: 658 Empresas. Organización de empresas Resumen: The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture Nota de contenido: Introduction -- Related Work -- Security in EPCglobal Networks -- Device-level Extensions -- Business-level Extensions for Event Repositories -- Qualitative and Quantitative Discussion -- Evaluation -- Conclusion -- Appendices En línea: http://dx.doi.org/10.1007/978-3-642-36343-6 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=36118 Ejemplares
Signatura Medio Ubicación Sub-localización Sección Estado ningún ejemplar
Título : Energy Relations and Policy Making in Asia Tipo de documento: documento electrónico Autores: Leo Lester ; SpringerLink (Online service) Editorial: Singapore : Springer Singapore Fecha de publicación: 2016 Otro editor: Imprint: Palgrave Macmillan Número de páginas: XXVI, 326 p. 16 illus. in color Il.: online resource ISBN/ISSN/DL: 978-981-10-1094-1 Idioma : Inglés (eng) Palabras clave: Energy policy and state security Economics Natural Resource Policy, Management Security Clasificación: 330 Economía en general Resumen: This volume goes beyond a conventional analysis of Asia's energy relationships and explores the premise that energy relations in Asia in the 21st century should reinforce mutual interdependence. Conventional analyses of international energy relations stress the asymmetric nature of the risks and costs of disruptions to energy flows. Energy suppliers (net exporters) are concerned with the cost of a buyer looking elsewhere; energy consumers (net importers) are preoccupied with the costs associated with an interruption of supply. This perspective reflects the current transactional nature of energy relations and is clearly observed in the energy dynamics between countries in the Gulf Cooperation Council (GCC) and the economies of Northeast Asia (NEA). As the economies of both the GCC and NEA have enlarged there is under-recognized potential for a move away from narrow transactional relations to broader, interdependent ones. This collection of essays from leading energy, strategic, and economic policy think tanks focused on how energy relations are forming in the 21st century offers energy scholars and policy makers answers to what these increasingly close relationships mean for international politics and trade. Nota de contenido: 1. GCC-NEA Oil Trade: Competition in Asian Oil Markets and the Russian 'Pivot' East - KAPSARC (GCC) -- 2. Potential impact of methane hydrate development on GCC and NEA energy trade - MASDAR (GCC) -- 3. Effects of Oil Price Volatility on Bilateral Trade between China and GCC - State Information Center (NEA) -- 4. Market and Hierarchical Interactions between East and West Asian Oil Sectors: Theory and Practice - DERASAT (GCC) -- 5. From GCC-Asian Energy-oriented Trade to Comprehensive Trade and Investment Links: A Case Study of Taiwan - Chung-Hua Institution for Economic Research and CTCI Foundation (NEA) -- 6. Changes in the Chinese natural gas market and their potential impacts on the relationship between China and GCC countries - Shanghai Fudan University (NEA) -- 7. Impacts of PV Adoption in Qatar on LNG Exports Northeast Asia and Ensuring Environmental Benefits - QEERI (GCC).-8. The Dynamics of Energy Geopolitics in the Gulf and Qatar's foreign relations with East Asia - Qatar University (GCC) -- 9. Evaluating the impact of oil exports in GCC countries on China's oil security - Chinese Academy of Sciences (NEA) -- 10. Assessing the Impact of Political Disruptions on Crude Oil Trade - KAPSARC (GCC) -- 11. Commercial Stockpiling: An Alternative for Joint Stockpiling of Oil in North East Asia - KEEI (NEA) -- 12. Energy embodiments of the GCC and NEA countries - Renmin University of China (NEA) -- 13. Analysis of cooperation potential on low-carbon energy between GCC and NEA - International Energy Research Center (NEA) -- 14. An era of collaboration to promote energy efficiency - Institute of Energy Economics, Japan (NEA) En línea: http://dx.doi.org/10.1007/978-981-10-1094-1 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41888 Energy Relations and Policy Making in Asia [documento electrónico] / Leo Lester ; SpringerLink (Online service) . - Singapore : Springer Singapore : Imprint: Palgrave Macmillan, 2016 . - XXVI, 326 p. 16 illus. in color : online resource.
ISBN : 978-981-10-1094-1
Idioma : Inglés (eng)
Palabras clave: Energy policy and state security Economics Natural Resource Policy, Management Security Clasificación: 330 Economía en general Resumen: This volume goes beyond a conventional analysis of Asia's energy relationships and explores the premise that energy relations in Asia in the 21st century should reinforce mutual interdependence. Conventional analyses of international energy relations stress the asymmetric nature of the risks and costs of disruptions to energy flows. Energy suppliers (net exporters) are concerned with the cost of a buyer looking elsewhere; energy consumers (net importers) are preoccupied with the costs associated with an interruption of supply. This perspective reflects the current transactional nature of energy relations and is clearly observed in the energy dynamics between countries in the Gulf Cooperation Council (GCC) and the economies of Northeast Asia (NEA). As the economies of both the GCC and NEA have enlarged there is under-recognized potential for a move away from narrow transactional relations to broader, interdependent ones. This collection of essays from leading energy, strategic, and economic policy think tanks focused on how energy relations are forming in the 21st century offers energy scholars and policy makers answers to what these increasingly close relationships mean for international politics and trade. Nota de contenido: 1. GCC-NEA Oil Trade: Competition in Asian Oil Markets and the Russian 'Pivot' East - KAPSARC (GCC) -- 2. Potential impact of methane hydrate development on GCC and NEA energy trade - MASDAR (GCC) -- 3. Effects of Oil Price Volatility on Bilateral Trade between China and GCC - State Information Center (NEA) -- 4. Market and Hierarchical Interactions between East and West Asian Oil Sectors: Theory and Practice - DERASAT (GCC) -- 5. From GCC-Asian Energy-oriented Trade to Comprehensive Trade and Investment Links: A Case Study of Taiwan - Chung-Hua Institution for Economic Research and CTCI Foundation (NEA) -- 6. Changes in the Chinese natural gas market and their potential impacts on the relationship between China and GCC countries - Shanghai Fudan University (NEA) -- 7. Impacts of PV Adoption in Qatar on LNG Exports Northeast Asia and Ensuring Environmental Benefits - QEERI (GCC).-8. The Dynamics of Energy Geopolitics in the Gulf and Qatar's foreign relations with East Asia - Qatar University (GCC) -- 9. Evaluating the impact of oil exports in GCC countries on China's oil security - Chinese Academy of Sciences (NEA) -- 10. Assessing the Impact of Political Disruptions on Crude Oil Trade - KAPSARC (GCC) -- 11. Commercial Stockpiling: An Alternative for Joint Stockpiling of Oil in North East Asia - KEEI (NEA) -- 12. Energy embodiments of the GCC and NEA countries - Renmin University of China (NEA) -- 13. Analysis of cooperation potential on low-carbon energy between GCC and NEA - International Energy Research Center (NEA) -- 14. An era of collaboration to promote energy efficiency - Institute of Energy Economics, Japan (NEA) En línea: http://dx.doi.org/10.1007/978-981-10-1094-1 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41888 Ejemplares
Signatura Medio Ubicación Sub-localización Sección Estado ningún ejemplar
Título : The Quest to Cyber Superiority : Cybersecurity Regulations, Frameworks, and Strategies of Major Economies Tipo de documento: documento electrónico Autores: Nir Kshetri ; SpringerLink (Online service) Editorial: Cham : Springer International Publishing Fecha de publicación: 2016 Otro editor: Imprint: Springer Número de páginas: XXIV, 240 p. 2 illus. in color Il.: online resource ISBN/ISSN/DL: 978-3-319-40554-4 Idioma : Inglés (eng) Palabras clave: Political economy International relations Computer security law Intellectual property Law and legislation Economic policy crimes Economics R & D/Technology Policy Cybercrime Systems Data Security Relations IT Media Law, Property Economy Clasificación: 330 Economía en general Resumen: This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries' engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation's technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues Nota de contenido: Global Cybersecurity: Key Issues and Concepts -- The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data -- Cybersecurity in National Security and International Relations -- Cybersecurity's Effects on International Trade and Investment -- Cybersecurity in the USA -- Cybersecurity in European Union Economies -- Cybersecurity in China -- Cybersecurity in India -- Cybersecurity in Japan -- Cybersecurity in South Korea -- Cybersecurity in Gulf Cooperation Council Economies -- Cybersecurity in Brazil -- Cybersecurity in Russia -- Lessons Learned, Implications and the Way Forward En línea: http://dx.doi.org/10.1007/978-3-319-40554-4 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41676 The Quest to Cyber Superiority : Cybersecurity Regulations, Frameworks, and Strategies of Major Economies [documento electrónico] / Nir Kshetri ; SpringerLink (Online service) . - Cham : Springer International Publishing : Imprint: Springer, 2016 . - XXIV, 240 p. 2 illus. in color : online resource.
ISBN : 978-3-319-40554-4
Idioma : Inglés (eng)
Palabras clave: Political economy International relations Computer security law Intellectual property Law and legislation Economic policy crimes Economics R & D/Technology Policy Cybercrime Systems Data Security Relations IT Media Law, Property Economy Clasificación: 330 Economía en general Resumen: This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries' engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation's technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships between major economies, and explains how attempts to secure the cyber domain have been hampered by the lack of an international consensus on key issues and concepts. The book also reveals how some economies are now facing a tricky trade-off between economically productive uses of emerging technologies and an enhanced cybersecurity profile. In the context of current paradigms related to the linkages between security and trade/investment, it also delves into new perspectives that are being brought to light by emerging cybersecurity issues Nota de contenido: Global Cybersecurity: Key Issues and Concepts -- The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data -- Cybersecurity in National Security and International Relations -- Cybersecurity's Effects on International Trade and Investment -- Cybersecurity in the USA -- Cybersecurity in European Union Economies -- Cybersecurity in China -- Cybersecurity in India -- Cybersecurity in Japan -- Cybersecurity in South Korea -- Cybersecurity in Gulf Cooperation Council Economies -- Cybersecurity in Brazil -- Cybersecurity in Russia -- Lessons Learned, Implications and the Way Forward En línea: http://dx.doi.org/10.1007/978-3-319-40554-4 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41676 Ejemplares
Signatura Medio Ubicación Sub-localización Sección Estado ningún ejemplar Advanced Information Systems Engineering Workshops / SpringerLink (Online service) ; John Krogstie ; Haralambos Mouratidis ; Jianwen Su (2016)
![]()
Título : Advanced Information Systems Engineering Workshops : CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings Tipo de documento: documento electrónico Autores: SpringerLink (Online service) ; John Krogstie ; Haralambos Mouratidis ; Jianwen Su Editorial: Cham : Springer International Publishing Fecha de publicación: 2016 Otro editor: Imprint: Springer Colección: Lecture Notes in Business Information Processing, ISSN 1865-1348 num. 249 Número de páginas: XXXIII, 276 p. 75 illus Il.: online resource ISBN/ISSN/DL: 978-3-319-39564-7 Idioma : Inglés (eng) Palabras clave: Business Management information systems Software engineering Computer security Application software and Information Systems Applications (incl. Internet) Engineering Enterprise Architecture Data Security Appl. in Administrative Processing Clasificación: 004:658 Informática de gestión. Comercio electrónico. Auditoría informática Resumen: This book constitutes the thoroughly refereed proceedings of five international workshops held in Ljubljana, Slovenia, in conjunction with the 28th International Conference on Advanced Information Systems Engineering, CAiSE 2016, in June 2016. The 16 full and 9 short papers were carefully selected from 51 submissions. The associated workshops were the Third International Workshop on Advances in Services DEsign based on the Notion of CApabiliy (ASDENCA) co-arranged with the First International Workshop on Business Model Dynamics and Information Systems Engineering (BumDISE), the Fourth International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the First International Workshop on Energy-awareness and Big Data Management in Information Systems (EnBIS), the Second International Workshop on Enterprise Modeling (EM), and the Sixth International Workshop on Information Systems Security Engineering (WISSE). En línea: http://dx.doi.org/10.1007/978-3-319-39564-7 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41001 Advanced Information Systems Engineering Workshops : CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings [documento electrónico] / SpringerLink (Online service) ; John Krogstie ; Haralambos Mouratidis ; Jianwen Su . - Cham : Springer International Publishing : Imprint: Springer, 2016 . - XXXIII, 276 p. 75 illus : online resource. - (Lecture Notes in Business Information Processing, ISSN 1865-1348; 249) .
ISBN : 978-3-319-39564-7
Idioma : Inglés (eng)
Palabras clave: Business Management information systems Software engineering Computer security Application software and Information Systems Applications (incl. Internet) Engineering Enterprise Architecture Data Security Appl. in Administrative Processing Clasificación: 004:658 Informática de gestión. Comercio electrónico. Auditoría informática Resumen: This book constitutes the thoroughly refereed proceedings of five international workshops held in Ljubljana, Slovenia, in conjunction with the 28th International Conference on Advanced Information Systems Engineering, CAiSE 2016, in June 2016. The 16 full and 9 short papers were carefully selected from 51 submissions. The associated workshops were the Third International Workshop on Advances in Services DEsign based on the Notion of CApabiliy (ASDENCA) co-arranged with the First International Workshop on Business Model Dynamics and Information Systems Engineering (BumDISE), the Fourth International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the First International Workshop on Energy-awareness and Big Data Management in Information Systems (EnBIS), the Second International Workshop on Enterprise Modeling (EM), and the Sixth International Workshop on Information Systems Security Engineering (WISSE). En línea: http://dx.doi.org/10.1007/978-3-319-39564-7 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=41001 Ejemplares
Signatura Medio Ubicación Sub-localización Sección Estado ningún ejemplar
Título : Enterprise Identity Management : Towards an Investment Decision Support Approach Tipo de documento: documento electrónico Autores: Denis Royer ; SpringerLink (Online service) Editorial: Berlin, Heidelberg : Springer Berlin Heidelberg Fecha de publicación: 2013 Otro editor: Imprint: Springer Colección: Progress in IS, ISSN 2196-8705 Número de páginas: XX, 219 p Il.: online resource ISBN/ISSN/DL: 978-3-642-35040-5 Idioma : Inglés (eng) Palabras clave: Business Management Industrial management Information technology Data processing Computer security information systems science and IT in Systems Security of Computing Innovation/Technology Clasificación: 658 Empresas. Organización de empresas Resumen: The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented Nota de contenido: Introduction -- Scientific Positioning and Research Approach -- EIdM: Concepts, Technologies, and Application Fields -- Evaluation of EIdMS Investments -- A Decision Support Model for the Introduction of EIdMS Systems -- Prototype Implementation of an EIdMS Decision Support System -- Empirical Evaluation of the Theoretical Model -- Conclusion and Outlook En línea: http://dx.doi.org/10.1007/978-3-642-35040-5 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=36566 Enterprise Identity Management : Towards an Investment Decision Support Approach [documento electrónico] / Denis Royer ; SpringerLink (Online service) . - Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013 . - XX, 219 p : online resource. - (Progress in IS, ISSN 2196-8705) .
ISBN : 978-3-642-35040-5
Idioma : Inglés (eng)
Palabras clave: Business Management Industrial management Information technology Data processing Computer security information systems science and IT in Systems Security of Computing Innovation/Technology Clasificación: 658 Empresas. Organización de empresas Resumen: The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented Nota de contenido: Introduction -- Scientific Positioning and Research Approach -- EIdM: Concepts, Technologies, and Application Fields -- Evaluation of EIdMS Investments -- A Decision Support Model for the Introduction of EIdMS Systems -- Prototype Implementation of an EIdMS Decision Support System -- Empirical Evaluation of the Theoretical Model -- Conclusion and Outlook En línea: http://dx.doi.org/10.1007/978-3-642-35040-5 Link: https://biblioteca.cunef.edu/gestion/catalogo/index.php?lvl=notice_display&id=36566 Ejemplares
Signatura Medio Ubicación Sub-localización Sección Estado ningún ejemplar PermalinkAttribute-based Credentials for Trust / SpringerLink (Online service) ; Kai Rannenberg ; Jan Camenisch ; Ahmad Sabouri (2015)
![]()
PermalinkPermalinkPermalinkPermalink