2018
DOI: 10.1007/978-3-319-77028-4_98
|View full text |Cite
|
Sign up to set email alerts
|

Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
2
0
1
Order By: Relevance
“…AHP abbreviated for Analytic Hierarchy Process (Saaty, 2008). AHP proposes the complexities be broken down into similar sub-scope comparisons, assigning comparative ratings and analyzing the outcome to determine the best result (Zare et al, 2018). To do this, first, the problem needs to be defined and a best-suited structure needs to be determined using a decision hierarchy.…”
Section: Ahpmentioning
confidence: 99%
“…AHP abbreviated for Analytic Hierarchy Process (Saaty, 2008). AHP proposes the complexities be broken down into similar sub-scope comparisons, assigning comparative ratings and analyzing the outcome to determine the best result (Zare et al, 2018). To do this, first, the problem needs to be defined and a best-suited structure needs to be determined using a decision hierarchy.…”
Section: Ahpmentioning
confidence: 99%
“…As a result, ABAC can be used to secure the EHR by using dynamic attributes that are applicable to healthcare such as the location of care and the purpose of use of the EHR. RBAC is another -Nimeh, 2011;Aloul et al, 2009;Brose, 2011;Furnell et al, 2008;Gregg, 2017;Mitchell and Shing, 2018;Mustafi c et al, 2011;Pradhan et al, 2018;Radha and Reddy, 2012;Whitman and Mattord, 2016;Zare et al, 2018;Zuniga et al, 2010) Clark-Wilson and ANSI rolebased access access control model that can be used to secure the EHR. Roles in RBAC are linked to the organisational structure of an organisation (Furnell et al, 2008 (INCITS, 2012a).…”
Section: Authorisationmentioning
confidence: 99%
“…Estas herramientas se ubican fundamentalmente de cara a internet y son capaces de prevenir el acceso no autorizado desde y hacia las redes internas de una organización (Lee, Kim, Park & Woo, 2015;Rafamantanantsoa & Rabetafika, 2018). Sampaio & Bernardino (2017) y Zare, Olsen, Zare, & Azadi (2018) determinaron que los cortafuegos pueden implementarse mediante herramientas basadas en software o dispositivos de hardware especializados. Los firewalls basados en software son implementados en un sistema operativo estándar y utilizan los recursos computacionales del ordenador donde este opera, por su parte, los firewalls basados en hardware constituyen dispositivos físicos fabricados exclusivamente para esta función que poseen su propia CPU, memoria RAM, almacenamiento interno y sistema operativo (Konikiewicz & Markowski, 2017).…”
Section: Introductionunclassified