Latest Communications of International Proceedings articles

21
Jun
2022

How Green Are the Competency Requirements for Project Managers? An Exploratory Analysis of Online Job Adds for The Region of Aveiro

Research Perspectives on Management, Innovation, and Sustainability in Organizations: 39MGT 2022
The goal of the 2050 horizon is to achieve net-zero emissions or climate neutrality. Therefore, a transformation of the global economy to a more circular and green economy is essential, as it enables the continuation of economic growth that has lifted many people out of…
23
Feb
2022

Database Security: Challenges and Protections

Security in Digital Environments - Innovations and Methods: 39SP 2022
The use of database systems is growing, so is vulnerable to security breaches. We surveyed the latest security challenges facing database systems including weak authentications, unauthorized privilege elevations, excessive privileges, SQL injection, malware, intellectual property rights, lack of reliable technical operators, database survivability, and denial…
23
Feb
2022

Existing Methods of Security Anomaly Detection in Software Defined Networks (SDN)

Security in Digital Environments - Innovations and Methods: 39SP 2022
Software Defined Network (SDN) allows for scalability and flexibility unseen in traditional networking. Development of services and increasing threats from malicious software and attackers may put SDN-based network in danger. To ensure SDN controller security and prevent network overload the monitoring measures required. There are…
23
Feb
2022

Authentication Methods in Modern Web Services

Security in Digital Environments - Innovations and Methods: 39SP 2022
This article presents comparative analysis of selected authentication methods used in modern Web services. Conducted study was based on analyzing level of implementation complexity in JavaScript programming language and Node.js environment, on analyzing security level that certain authentication methods could provide, and popularity of authentication…
23
Feb
2022

NFT-Based User Authentication Scheme for Mobile Apps

Security in Digital Environments - Innovations and Methods: 39SP 2022
User authentication is a process that was evaluated through the years, but still focused on providing authentication data – in most cases username and password. That approach forces users to remember many complicated passwords, which results in reusing them for many services. The solution that…
23
Feb
2022

Security Mechanisms for Applications Developed in Java

Security in Digital Environments - Innovations and Methods: 39SP 2022
As an object-oriented programming language, Java is designed to address security concerns. At its core, Java is type-safe and provides automatic garbage collection, increasing the reliability of the application code. A secure class loading and validation mechanism ensure that only authorized Java code is executed.…
23
Feb
2022

Ensuring Data Security in Cloud Computing

Security in Digital Environments - Innovations and Methods: 39SP 2022
Cybersecurity is one of the most important subjects in the world of informatics these days. Attacks are more and more evolved and dangerous. It is the responsibility of organizations to protect themselves, understanding the threats, implementing security policies, training employees, and investing in application security.…

Archives