完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLai, Yeu-Pong
dc.contributor.authorChou, Shih-I
dc.contributor.authorSu, Guang-Yuh
dc.date.accessioned2009-08-23T04:44:06Z
dc.date.accessioned2020-05-25T06:51:25Z-
dc.date.available2009-08-23T04:44:06Z
dc.date.available2020-05-25T06:51:25Z-
dc.date.issued2008-11-11T07:20:34Z
dc.date.submitted2007-07-01
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/10983-
dc.description.abstractWith the growing in computer network usages of fixed or wireless infrastructures, the information security becomes more important. Most security issues are focused on preventing attacks from the outsiders or wireless users. However, these authorized wireless users have no right to take part in the drawing-up security policy of an organization. They do not even know the security level of the fixed network provided. They can only connect by chance. Besides, the larger network scales the more difficulty to be maintained. Patching and managing the mass of computer vulnerabilities are a timely but critical issue. The Integrated Vulnerabilities Management System helps the network administrators to make sure what security vulnerabilities are really critical and offers the wireless and fixed network users to present what solutions they suggest. This paper proposes a system to help users efficiently accessing information, easily getting solutions and conveniently communicating others. Not only the security administrators can get aid but also the other managers and employees could be supported with this system.
dc.format.extent10P.
dc.relation.isversionofVol18
dc.relation.isversionofNo1
dc.subjectwireless communications
dc.subjectcollaborative works
dc.subjectknowledge management
dc.subjectgroup decision support
dc.titleHow can wireless users identify themselves with the security issues?
dc.title.alternative-- the integrated vulnerability management system
分類:Journal of Computers第18卷

文件中的檔案:
檔案 描述 大小格式 
JOC_18_2_2.pdf495.36 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。