Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,341,792 papers from all fields of science
Search
Sign In
Create Free Account
Logical security
Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Access control
Authentication
Biometrics
Bluetooth
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Desiging a logical security framework for e-commerce system based on soa
A. K. Luhach
,
Dr. Sanjay K. Dwivedi
,
Dr. C. K. Jha
arXiv.org
2014
Corpus ID: 1461879
Rapid increases in information technology also changed the existing markets and transformed them into e- markets (e-commerce…
Expand
2014
2014
Designing and implementing the logical security framework for e-commerce based on service oriented architecture
A. K. Luhach
,
Dr. Sanjay K. Dwivedi
,
Dr. C. K. Jha
arXiv.org
2014
Corpus ID: 8541959
Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the…
Expand
2012
2012
A Comprehensive Evaluation Model of Network Information Security Based on Interval-Valued Fuzzy Mathematics
Dongsheng Chen
,
Xin Li
International Conference on Computer Science and…
2012
Corpus ID: 7603323
According to the uncertainty of network information security, this paper mainly deals with a new model of comprehensive…
Expand
Review
2006
Review
2006
IEEE 802.11 Wireless LAN Security Overview
A. A. Naamany
,
Ali Al Shidhani
,
H. Bourdoucen
2006
Corpus ID: 15803299
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers…
Expand
2000
2000
A conceptual architecture for real-time intrusion monitoring
S. Furnell
,
P. Dowland
Information Management & Computer Security
2000
Corpus ID: 14744619
The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue…
Expand
1999
1999
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS
J. Snare
1999
Corpus ID: 7778004
TELECOMMUNICATIONS NETWORKS ARE BECOMING MORE COMPLEX. Traditional voice networks are now being augmented by a variety of data…
Expand
Review
1995
Review
1995
Smartcards and biometrics: an overview☆
Ernst Bovelander
,
R. V. Renesse
1995
Corpus ID: 62754791
Highly Cited
1987
Highly Cited
1987
Physical Security for the μABYSS System
Steve H. Weingart
IEEE Symposium on Security and Privacy
1987
Corpus ID: 14824345
Open systems, now common in many small computers, have given the user logical access to all parts of his or her system. At the…
Expand
1985
1985
Data security and confidentiality in Europe
Jean-Pierre Chamoux
Computers & security
1985
Corpus ID: 30407540
1982
1982
Data security management in distributed data bases
U. Bussolati
,
G. Martella
Information Systems
1982
Corpus ID: 44252491
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required