Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    Jinxin Zuo1,2, Yueming Lu1,2,*, Hui Gao2,3, Tong Peng1,2, Ziyv Guo2,3, Tong An1,2, Enjie Liu4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2579-2595, 2021, DOI:10.32604/cmc.2021.016623

    Abstract With the skyrocketing development of technologies, there are many issues in information security quantitative evaluation (ISQE) of complex heterogeneous information systems (CHISs). The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently. In this paper, we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process. The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively. Firstly, with the support of asset identification and topology data, we… More >

  • Open Access

    ARTICLE

    Security Threats to Business Information Systems Using NFC Read/Write Mode

    Sergio Rios-Aguilar1,2,*, Marta Beltrán2, González-Crespo Rubén3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2955-2969, 2021, DOI:10.32604/cmc.2021.014969

    Abstract Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type of interaction. It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats, such as plain text, simple URLs or enriched URLs. Using a wide variety of physical form factors, NFC-compatible… More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks like spoofing, replay, Masquerade, and… More >

  • Open Access

    ARTICLE

    A Holistic, Proactive and Novel Approach for Pre, During and Post Migration Validation from Subversion to Git

    Vinay Singh1, Mohammed Alshehri2,*, Alok Aggarwal3, Osama Alfarraj4, Purushottam Sharma5, K. R. Pardasani6

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2359-2371, 2021, DOI:10.32604/cmc.2021.013272

    Abstract Software development is getting a transition from centralized version control systems (CVCSs) like Subversion to decentralized version control systems (DVCDs) like Git due to lesser efficiency of former in terms of branching, fusion, time, space, merging, offline commits & builds and repository, etc. Git is having a share of 77% of total VCS, followed by Subversion with a share of 13.5%. The majority of software industries are getting a migration from Subversion to Git. Only a few migration tools are available in the software industry. Still, these too lack in many features like lack of identifying the empty directories as… More >

  • Open Access

    ARTICLE

    Developing a Holistic Model for Assessing the ICT Impact on Organizations: A Managerial Perspective

    Farrukh Saleem1,2, Naomie Salim2, Abdulrahman H. Altalhi1, Abdullah AL‐Malaise AL‐Ghamdi1, Zahid Ullah1, Noor ul Qayyum1

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 259-277, 2019, DOI:10.31209/2018.100000002

    Abstract Organizations are currently more dependent on Information and Communication Technology (ICT) resources. The main purpose of this research is to help the organization in order to maintain the quality of their ICT project based on evaluation criteria presented in this research. This paper followed several steps to support the methodology section. Firstly, an experimental investigation conducted to explore the values assessment criterion, an organization may realize from ICT project such as information systems, enterprise systems and IT infrastructure. Secondly, the investigation is further based on empirical data collected and analyzed from the respondents of six case studies using questionnaire based… More >

Displaying 11-20 on page 2 of 15. Per Page