Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Charles Campbell Palmer"'
Autor:
Charles Campbell Palmer, Rick Wash, L. Jean Camp, Sunny Consolvo, Markus Jakobsson, M. Angela Sasse
Publikováno v:
IEEE Security & Privacy. 12:39-42
Guest editors M. Angela Sasse and Charles C. Palmer speak with security practitioners about what companies are doing to keep customers secure, and what users can do to stay safe.
Publikováno v:
IEEE Security & Privacy. 12:11-13
Usable security is often seen as simply an enabler of good security behavior: if the actions required aren't too difficult or effortful, users will do so. But human-centered design of security means enabling users to make informed security choices. F
Publikováno v:
IEEE Security & Privacy Magazine. 8:56-59
The economic consequences of a cyberattack on major critical infrastructures might well outweigh the cost of fielding the CNG. Furthermore, an ad hoc group of private consultants wouldn't have the time, teamwork, or skills to address a major cyberatt
Publikováno v:
Computer Communications. 29:306-324
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to anyone of just about any experience level. Thus, in many respects, the virtual world has become a viable alternative to our real world, where we can b
Publikováno v:
IEEE Security and Privacy Magazine. 3:68-71
Cryptography isn't in the public eye very often, but when it is, the news can be disconcerting. The authors discuss the issues that have arisen around the recently announced problems with the SHA-1 hash function and its ancestor, MD5.
Publikováno v:
IBM Systems Journal. 42:107-118
System and network security are vital parts of any autonomic computing solution. The ability of a system to react consistently and correctly to situations ranging from benign but unusual events to outright attacks is key to the achievement of the goa
Autor:
Charles Campbell Palmer
Publikováno v:
IBM Systems Journal. 40:769-780
The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As
Publikováno v:
IEEE Security & Privacy Magazine. 5:13-15
In this special issue, we focus on the challenges of managing organizational security, examining some of the nontechnical aspects of security that assure that the technology is chosen, implemented, and used appropriately and well.
Autor:
Charles Campbell Palmer
Publikováno v:
IEEE Security & Privacy Magazine. 2:10-12
Publikováno v:
International Conference on Evolutionary Computation
We consider the problem of representing trees (undirected, cycle-free graphs) in genetic algorithms. This problem arises, among other places, in the solution of network design problems. After comparing several commonly used representations based on t