Show simple item record

dc.contributor.authorSsembatya, Richard
dc.contributor.authorKayem, Anne V. D. M.
dc.contributor.authorBurke, Mark-John
dc.date.accessioned2019-02-14T08:27:12Z
dc.date.available2019-02-14T08:27:12Z
dc.date.issued2014
dc.identifier.citationSsembatya, R.; Kayem, Anne V. D. M. & Burke, M. J., 2014. Diversity in Security Environments: The Why and the Wherefore. Uganda Martyrs University, Nkozi: Uganda Martyrs University.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12280/1349
dc.description.abstractInformation security is generally discussed in terms of preventing adversarial access to applications and to the data these applications handle. The authors note, however, that increasingly, creating information security solutions that are based on the difficulty of discovering the solution is no longer a truly viable approach. Some of the reasons for this include the increasing availability of faster processing power, high-performance computing systems, and big data availability. On the opposite end, issues such as frequent power outages in resource-constrained environments make applying standard security schemes challenging. In this chapter, the authors discuss examples that highlight the challenges of applying conventional security solutions to constrained resource environments. They postulate that effective security solutions for these environments require rather unconventional approaches to security-solution design. Such solutions would need to take into consideration environmental and behavioral factors in addition to drawing inspiration in certain cases from natural or biological processes.en_US
dc.language.isoenen_US
dc.publisherUganda Martyrs Universityen_US
dc.subjectDiversityen_US
dc.subjectSecurityen_US
dc.subjectEnvironmentsen_US
dc.titleDiversity in Security Environments: The Why and the Whereforeen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record