Browsing by Subject "Security"
Now showing items 1-8 of 8
-
A dependable model for attaining maximum authetication security procedure in a grid based environment
(Academic Journals Inc., 2012)Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer ... -
Ensuring the security and privacy of information in mobile health-care communication systems
(Academy of Science of South Africa, 2011)The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data ... -
Intelligent transportation related complex systems and sensors
(MPDI, 2021)Building around innovative services related to different modes of transport and traffic management, intelligent transport systems (ITSs) are being widely adopted worldwide to improve the efficiency and safety of the ... -
Redefining defence in the post-apartheid security imaginary: The politics of meaning-fixing
(University of the Free State, 2008)This article traces the politics of meaning-fixing with respect to the role of the defence force as apartheid declined from the mid-1980s, as it was negotiated from a current to a past organising principle of the “security ... -
The Security imaginary: Explaining military isomorphism
(Sage, 2008)This article proposes the notion of a security imaginary as a heuristic tool for exploring military isomorphism (the phenomenon that weapons and military strategies begin to look the same across the world) at a time ... -
Smartphone owners need security advice. How can we ensure they get it?
(CONF-IRM and AIS Electronic Library (AISeL), 2016)Computer users often behave insecurely, and do not take the precautions they ought to. One reads almost daily about people not protecting their devices, not making backups and falling for phishing messages. This impacts ... -
Sub-regional organisations and the responsibility to protect: A case for the localisation and normative repatriation of sub-regional authority for coercive measures
(Scielo South Africa, 2021)The adoption of the responsibility to protect by the United Nations General Assembly marked a key milestone in the advancement of human security and the international protection of human rights. The textual adoption by the ... -
Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment
(South African Institute of Electrical Engineers, 2013)The application of grid computing has been hampered by three basic challenges: scalability, interoperability and efficient access control which need to be optimized before a full-scale adoption of grid computing can take ...