1 resultado para medicative components
em Research Open Access Repository of the University of East London.
Filtro por publicador
- Aberystwyth University Repository - Reino Unido (1)
- Acceda, el repositorio institucional de la Universidad de Las Palmas de Gran Canaria. España (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (13)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- Aquatic Commons (5)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (2)
- Archive of European Integration (4)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (6)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (30)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (12)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (50)
- Brock University, Canada (7)
- Cambridge University Engineering Department Publications Database (72)
- CentAUR: Central Archive University of Reading - UK (55)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (51)
- Cochin University of Science & Technology (CUSAT), India (4)
- Collection Of Biostatistics Research Archive (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (7)
- CORA - Cork Open Research Archive - University College Cork - Ireland (4)
- Dalarna University College Electronic Archive (7)
- Department of Computer Science E-Repository - King's College London, Strand, London (1)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digital Commons - Michigan Tech (1)
- DigitalCommons@The Texas Medical Center (9)
- DigitalCommons@University of Nebraska - Lincoln (1)
- Duke University (1)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (10)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (1)
- Greenwich Academic Literature Archive - UK (14)
- Helda - Digital Repository of University of Helsinki (13)
- Indian Institute of Science - Bangalore - Índia (47)
- Instituto Politécnico de Bragança (1)
- Instituto Politécnico do Porto, Portugal (3)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (2)
- Massachusetts Institute of Technology (2)
- Ministerio de Cultura, Spain (4)
- Open University Netherlands (1)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (4)
- Publishing Network for Geoscientific & Environmental Data (146)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (99)
- Queensland University of Technology - ePrints Archive (69)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (2)
- Repositório Digital da UNIVERSIDADE DA MADEIRA - Portugal (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (2)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (120)
- Research Open Access Repository of the University of East London. (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- School of Medicine, Washington University, United States (4)
- Universidad del Rosario, Colombia (1)
- Universidade Federal do Pará (2)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universitat de Girona, Spain (11)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (4)
- Université de Lausanne, Switzerland (1)
- Université de Montréal, Canada (5)
- University of Connecticut - USA (2)
- University of Southampton, United Kingdom (1)
Resumo:
This paper describes the various Geofencing Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Networks