Infrastructure Security in UK Law

  • Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
    • No. 48-1, February 2020
    • Information Discovery and Delivery
    • 14-22
    Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and r...
  • Arms Limiting and Force Adjusting Arrangements in the Northern Cap Area
    • No. 7-1, March 1972
    • Cooperation and Conflict
    The author starts out by delineating the existing system of unilateral arms control measures which is observed by Norway. He distinguishes between unilateral formal measures on the one hand and sem...
    ......=1699422129&Signature=QL6qqnQm1ijIVjt2cWC%2BHm3RhDg%3D&x-amz-security... ad- justment regulations as part of the security infrastructure of the post-cold war Europe. Thus the Norwegian constraints would ......
  • Arms Limiting and Force Adjusting Arrangements in the Northern Gap Area
    • No. 7-2, July 1972
    • Cooperation and Conflict
    The author starts out by delineating the existing system of unilateral arms control measures which is observed by Norway. He distinguishes between unilateral formal measures on the one hand and sem...
    ...... force reduction and force ad-justment regulations as part of the security infrastructure of the post-cold war Europe.Thus the Norwegian constraints ......
  • Snapshots of laptop use in an academic library
    • No. 28-3, September 2010
    • Library Hi Tech
    • 447-453
    Purpose: The purpose of this paper is to quantify recent changes in students' use of laptops in one academic library and to consider the potential role of new high‐tech library spaces on laptop use...
    ...... about facilities, technologyinfrastructure and support, and security.Keywords Academic libraries,Laptops, Information facilities,Technology led ... spaces in which these devices are used, includingtechnology infrastructure, aesthetics, policies, and other amenities about the physicallocation. In ......
  • Investment performance indicators of selected Lagos commercial properties
    • No. 34-1, February 2016
    • Journal of Property Investment & Finance
    • 83-97
    Purpose: – The purpose of this paper is to identify drivers of investment performance of commercial property in Lagos with a view to preventing a rule of thumb approach to investments’ decisions. ...
    ...... as cost of buildingmaterials, location, quality of road infrastructure, rental growth and security. Findings across sub-markets reveal three ......
  • Trusting records: is Blockchain technology the answer?
    • No. 26-2, July 2016
    • Records Management Journal
    • 110-139
    Purpose: The purpose of this paper is to explore the value of Blockchain technology as a solution to creating and preserving trustworthy digital records, presenting some of the limitations, risks a...
    ...... and near term, assuming proper securityarchitecture and infrastructure management controls. It does not, however, guarantee reliability ... that undermine a country’s immigration policiesand national security. Insecure land registries may create opportunities for corruptpoliticians ......
  • Integrating Web 2.0 into an academic library in Tanzania
    • No. 32-2, April 2014
    • The Electronic Library
    • 183-202
    Purpose: – This paper aims to demonstrate work undertaken by Muhimbili University of Health and Allied Sciences (MUHAS) Library in an effort to integrate Web 2.0 technologies in its functions to en...
    ...... library services, despite various challengesrelated to infrastructure, awareness, literacy, inadequate staff, security and ownership of Web ......
  • Social internet of vehicles: an epistemological and systematic perspective
    • No. 38-1, March 2020
    • Library Hi Tech
    • 221-231
    Purpose: Building upon Internet of Things (IoT), Internet of Vehicles (IoV) and Social Internet of Things (SIoT), Social Internet of Vehicles (SIoV) is the latest development in the field. SIoV all...
    ...... seven aspects: standardization,adaptability, scalability, infrastructure, lack of application, privacy and security.Originality/value –The paper ......
  • E‐Fraud: Current Trends and International Developments
    • No. 9-4, April 2002
    • Journal of Financial Crime
    • 347-354
    When Peter Steiner published his famous cartoon in The New Yorker in July 1993 with the renowned caption ‘On the Internet, nobody knows you are a dog’, he succeeded in coining within a single carto...
    ...... online without specific technologies like public key infrastructure and digital signatures is a near fruitless exercise. While such security ......
  • Connecting the dots on Canada’s connected battlespace
    • No. 76-1, March 2021
    • International Journal
    A “connected battlespace” (CB) aims to leverage emerging technologies, such as low Earth orbit satellites, internet of things devices, cloud computing, and artificial intelligence, in order to coll...
    ......=1699422129&Signature=glMEiuDLyxs8Rbf1JaxLxi%2FcKOk%3D&x-amz-security... several questions about the development of Canada’s CB infrastructure, touching on a number of themes, including alliance partner- ships, ......
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT