A Novel Security Approach for Access Model
نویسندگان
چکیده
منابع مشابه
a new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولPort security & access control: A systemic approach
Ports constitute crucial intermodal nodes in the freight and passenger transport network as well as important border control points. Their security is therefore of paramount importance not only because of their critical transport functions but also because of their specific role, as control points, in the regional, national and European security. Port security is a cornerstone for the implement...
متن کاملA Novel Authentication Protocol for Wireless Access Security
This paper proposes a novel authentication protocol for wireless access security. Current symmetric key based authentication schemes are vulnerable to a variety of attacks such as the denialof-service attacks and the domino effect attacks, while public key based authentication schemes are costly. This paper designed a novel elliptic curve based authentication scheme that can avoid the certifica...
متن کاملA Novel Model for Security Requirements Process
Nowadays, mostly security solutions are mainly focused on how to defend against various threats, including insider threats and outsider threats, instead of trying to solve security issues from their sources. In this paper, a security requirements engineering process is presented for security requirements elicitation and analysis. And the proposed process will deal with the security requirements...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016908953