Security Enterprise

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 28299 Experts worldwide ranked by ideXlab platform

Gao Peng - One of the best experts on this subject based on the ideXlab platform.

  • The research of Security Enterprise search
    Journal of Qiqihar University, 2010
    Co-Authors: Gao Peng
    Abstract:

    Application of Enterprise search engine brings convenience to Enterprise also brings considerable safety issues,Security search is the most importance of Enterprise search management technology,analysising of the safety problems caused by search engine,for the enormous quantity and multifarious structure,large amount of data and Security of information system in the Enterprise proposes a set of multistage authorized access control mechanism.This mechanism can be a very good solution to current Security issues facing the search engine,can provide not only theoretical guidance for information safety of Enterprise search but also a basis for Enterprise search Security framework.

Cheng Guang-hua - One of the best experts on this subject based on the ideXlab platform.

  • Design and Implementation of Enterprise Information Security System Based on IDS Technology
    Computer Simulation, 2008
    Co-Authors: Cheng Guang-hua
    Abstract:

    Enterprise Network Information Security System is a significant object. The paper first analyses the work principle of Distributed Intrusion Detection System. A feasible solution is put forward aiming at the Security of Security Enterprise trade network, which combines P2DR Dynamic Security Model with Distributed Intrusion Detection System technology. A system of network information Security based on Intrusion Detection System(IDS) is established. Application and execution in practice show that the solution can solve the problem of network Security of Security Enterprise application effectively. The work gives some experiences to the construction of Enterprise information system Security.

Julie F. Waters - One of the best experts on this subject based on the ideXlab platform.

  • Managing risk at the Tucson Sector of the U.S. Border Patrol.
    Risk Analysis, 2012
    Co-Authors: E. S. Levine, Julie F. Waters
    Abstract:

    This article describes a risk analysis used to inform resource allocation at the Tucson Sector of the U.S. Border Patrol, the busiest sector for alien and drug trafficking along the Southwest land border with Mexico. The model and methodology that underlie this analysis are generally applicable to many resource allocation decisions regarding the management of frequently occurring hazards, decisions regularly made by officials at all levels of the homeland Security Enterprise. The analysis was executed by agents without previous risk expertise working under a short time frame, and the findings from the analysis were used to inform several resource allocation decisions.

Kristen Greene - One of the best experts on this subject based on the ideXlab platform.

  • HCI (22) - Effects of Password Permutation on Subjective Usability Across Platforms
    Lecture Notes in Computer Science, 2015
    Co-Authors: Kristen Greene
    Abstract:

    The current work examines the effects of password permutation on subjective usability across platforms, using system-generated passwords that adhere to the password requirements found in higher-Security Enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improve password usability. Password permutation improves mobile device entry by reducing the number of keystrokes required to enter numbers and symbols. Across platforms smartphone, tablet, and desktop computer participants rated the longer length 14 permuted passwords as easier to type than the shorter length 10 non-permuted passwords. This demonstrates that the composition and structure of a password are important; people are sensitive to factors beyond simple password length. By combining qualitative and quantitative research, we will ultimately arrive at a more complete understanding of how password construction impacts usability.

Song Hong-mei - One of the best experts on this subject based on the ideXlab platform.

  • Comments on Modern Nanjing Social Security Enterprise(1927-1937)
    Journal of Shijiazhuang University, 2006
    Co-Authors: Song Hong-mei
    Abstract:

    After the Nanjing National Government was founded,social Security became a principal issue of social administration.As the capital,Nanjing had many social problems to be solved.Nanjing gradually established and improved the system of social Security.In the end,a system of modern guarantee was set up,containing social relief,social insurance and social welfare.Nanjing social Security Enterprise promoted social stability.Meanwhile,it reflected the modernization and progressiveness of urban development to a certain degree.