Skip to search formSkip to main contentSkip to account menu

Secure environment

In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Purpose – Employees' compliance with information security policies is considered an essential component of information security… 
2012
2012
MEERKATS is a novel architecture for cloud environments that elevates continuous system evolution and change as first-rate design… 
2008
2008
Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination… 
Review
2008
Review
2008
Due to the advances in the field of communications networks there evolved, a very interesting and challenging area of wireless… 
2007
2007
Issues pertaining to the production and consumption of corporate websites and online games remain relatively unexplored. This… 
Review
2001
Review
2001
The objectives of this study are to review the current literature on the application of distance education in reforming Technical… 
2000
2000
1993
1993
The multiparty secret key exchange problem is to find a k-player protocol for generating an n-bit random key. At the end of the…