Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Secure computing

Procedures and controls shall include use of secure, computer-generated time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. [Pg.641]

Section 11.10(d) Limiting system access to authorized individuals Section 11.10(e) Using secured, computer generated, time-stamped, audit trails... [Pg.302]

Guynes S. EFTS impact on computer security. Computers Sec 2 (1) 73-77, 1983. [Pg.239]

Electronic-based solutions can be used to support the security requirements contained in Part 11. The following sections in this chapter provide an overview of the main electronic-based solutions necessary to achieve trustworthy records, and to securing computer resources to manage these records. [Pg.158]

DECENTRALIZED ENERGY SUPPLY TO SECURE COMPUTER SYSTEMS... [Pg.75]

Leveson, N. G., A Systems-Theoretic Approach to Safety in Software-Intensive Systems, to appear in IEEE Trans, on Dependable and Secure Computing, 2004. [Pg.123]

Concepts and Taxonomy of Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp.11-33, 2004. [Pg.159]

Landwehr, C., Formal models for computer security, Computing Surveys, 13(3) 247-278, September 1981. [Pg.295]

User-independent computer-generated time-stamped audit trails. Procedures should be available to use secure, computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record changes shall not obscure previously recorded information. Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying. [Pg.235]

MiRo91 Silvio Micali, Phillip Rogaway Secure Computation (Chapters 1-3) Laboratory for Computer Science, MIT, Cambridge, Mass., distributed at Crypto 91. [Pg.381]

Jones, R. J. Lipton (ed.) Foundations of Secure Computation Academic Press, N.Y. 1978, 155-166. [Pg.383]

Yao82 Andrew C. Yao Protocols for Secure Computations 23rd Symposium on Foundations of Computer Science (FOCS) 1982, IEEE Computer Society, 1982, 160-164. [Pg.386]

The computer-controlled system acquires raw spectral data within the range of 200-400 nm at specified time intervals, calculates the results with the use of validated software, and stores the data in a secured computer database. Except for the dissolution apparatus itself, the system contains no moving parts. The spectral data can be corrected for turbidity-related scatter with the use of either a simple baseline subtraction or a second-derivative-based algorithm, and test results and/or profiles can be viewed in real time. [Pg.258]

Avizienis A, Laprie J, RandeU B, Landwehr C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transacts Dependable Secure Comput. 2004 l(l) ll-3. [Pg.100]

Cyber security Computer viruses Hackers The use of computer-based systems in sophisticated air navigation systems and on-board aircraft control and communications systems... [Pg.161]

Nicol, D. M., W. H. Sanders, and K. S. Trivedi (2004). Model-based evaluation From dependability to security. IEEE Transactions on Dependable and Secure Computing 7(1), 48-65. [Pg.1899]

Universities and Schools. Universities require a secure computer system to store student demographic and health data student grades and course work computer access information personnel information, including salaries research data and Internet use. Most students have their own personal computers and are able to access some areas of the university s computer system. Their digital signatures must be linked to a table that reflects their limited access. Faculty members, both on and off campus, are able to access the university s system, and their access also has limits. Researchers use the university system to store data for their projects and to perform analyses. Much of the research on encryption of data has been performed by university researchers. University staff have access to additional data based on their... [Pg.460]

Dobson, J., Randell, B. Building Reliable Secure Computing Systems Out Of Unreliable Insecure Components. In IEEE Symposium on Security and Privacy, p. 187. IEEE Computer Society, Los Alamitos (1986)... [Pg.50]

In addition, he is an accomplished author in various areas of safety, environment, quality, security, computers, etc. He also provides mentoring to other professionals who want to get published and is a frequent coauthor with those professionals. He is a frequent speaker at conferences and professional meetings. [Pg.496]


See other pages where Secure computing is mentioned: [Pg.44]    [Pg.161]    [Pg.116]    [Pg.121]    [Pg.354]    [Pg.245]    [Pg.337]    [Pg.759]    [Pg.22]    [Pg.24]    [Pg.26]    [Pg.63]    [Pg.148]    [Pg.124]    [Pg.424]    [Pg.35]    [Pg.210]   


SEARCH



Computer security

© 2024 chempedia.info