A model for secure knowledge sharing
Improvements made in digital data processing resulted in the ability to store knowledge objects in sharing systems in the form of documents, images, audio and even video streams. However, with the increasing reliance on online knowledge sharing technologies, there is also an increasing danger that k...
| Main Authors: | Ismail Ahmad, Ewe, Hong Tat |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
IEEE Xplore
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2390/ http://shdl.mmu.edu.my/2390/1/A%20model%20for%20secure%20knowledge%20sharing.pdf |
Similar Items
Knowledge Sharing Model For Online Communities Of Practice.
by: Ismail, Aisyah
Published: (2016)
by: Ismail, Aisyah
Published: (2016)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
An Enhanced Electronic Health Community With Knowledge-Based E-Mail And Agent-Based Knowledge Search And Sharing.
by: Cheah, Yu N, et al.
Published: (2004)
by: Cheah, Yu N, et al.
Published: (2004)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Digitising Dictionaries For Advanced Look-Up And Lexical Knowledge Research In Malay.
by: Lim, Lian Tze, et al.
Published: (2007)
by: Lim, Lian Tze, et al.
Published: (2007)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007)
by: Tan, Chue Poh, et al.
Published: (2007)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
Ant Colony Optimization approaches to the degree-constrained minimum spanning tree problem
by: Bau, Yoon Teck, et al.
Published: (2008)
by: Bau, Yoon Teck, et al.
Published: (2008)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
Ant algorithm for amplifier spontaneous emission (ASE)-aware routing
by: Chin, Tan Saw, et al.
Published: (2007)
by: Chin, Tan Saw, et al.
Published: (2007)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
by: Ye , Hong Hoe
Published: (2006)
by: Ye , Hong Hoe
Published: (2006)
Knowledge Sharing in an Electronics Manufacturing Firm: Evidence from Malaysia
by: Mohammed, Nurliza Fathi, et al.
Published: (2009)
by: Mohammed, Nurliza Fathi, et al.
Published: (2009)
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005)
by: Ho, , CK, et al.
Published: (2005)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
Knowledge Sharing in Knowledge-based Institutions
by: Jessica Sze-Yin, Ho, et al.
Published: (2008)
by: Jessica Sze-Yin, Ho, et al.
Published: (2008)
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CST334 – Network Monitoring & Security
(Pengawasan & Keselamatan Rangkaian)
CST338 – Network And Communication Security
(Keselamatan Rangkaian Dan Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Discovering ontological semantics for reuse and sharing of learning objects in a contextual learning environment
by: Kiu, Ching-Chieh, et al.
Published: (2005)
by: Kiu, Ching-Chieh, et al.
Published: (2005)
CST314 - NETWORK AND SECURITY MANAGEMENT MARCH 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Unidirectional Lightweight Encapsulation With Header Compression For IP Based Satellite Communication Over DVB-S.
by: Wan, Tat-Chee
Published: (2007)
by: Wan, Tat-Chee
Published: (2007)
Cognitive Radio-Based Power Adjustment For Wi-Fi.
by: Tat, Chee Wan
Published: (2009)
by: Tat, Chee Wan
Published: (2009)
CST314 - NETWORK MANAGEMENT AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST334 - NETWORK MONITORING AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
Knowledge Sharing Model For Online Communities Of Practice.
by: Ismail, Aisyah
Published: (2016) -
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005) -
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006) -
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005) -
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)