Articles with "security implications" as a keyword



Photo from wikipedia

Trends in Synthetic Biology Applications, Tools, Industry, and Oversight and Their Security Implications.

Sign Up to like & get
recommendations!
Published in 2018 at "Health security"

DOI: 10.1089/hs.2018.0067

Abstract: Recent developments in synthetic biology tools and techniques are driving commercialization of a wide range of products for human health, agriculture, environmental stewardship, and other purposes. This article reviews some of the trends in synthetic… read more here.

Keywords: synthetic biology; security implications; biology applications; biology ... See more keywords
Photo from wikipedia

Uncovering the Security Implications of Cloud Multi-Tenancy with Bolt

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Micro"

DOI: 10.1109/mm.2018.032271065

Abstract: Cloud providers routinely schedule multiple applications per physical host to increase efficiency. The resulting interference on shared resources often leads to performance degradation and, more importantly, security vulnerabilities. Interference can leak important information about an… read more here.

Keywords: bolt; cloud; security implications; implications cloud ... See more keywords
Photo from wikipedia

Personal Information in Passwords and Its Security Implications

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2705627

Abstract: While it is not recommended, Internet users tend to include personal information in their passwords for easy memorization. However, the use of personal information in passwords and its security implications have yet to be studied.… read more here.

Keywords: information; passwords security; information passwords; security implications ... See more keywords