نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

Journal: :Computer Standards & Interfaces 2005
Stamatis Karnouskos

Future services on converged heterogeneous networks are expected to increase the demand for code distribution, on the fly installment and dynamic management. Component discovery, download, installation, revocation, and profiling are critical in supporting next generation enabling technologies and application evolvement. We present here the architecture of an active component manager and discuss...

Journal: :J. High Speed Networks 2006
Simon N. Foley Barry P. Mulcahy Thomas B. Quillinan Meabh O'Connor John P. Morrison

With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. While much work investigating functional interoperability between different middleware architectures has been reported, little practical work has been done on providing a unified and/or interoperable view of security be...

2006
Jimmy McGibney Miguel Ponce de Leon John Ronan

This paper presents a model for securing mobile services using heterogeneous access networks, and implementing sample solutions using this framework. This is a project that is defining new security models and policies to address the new issues of the pervasive computing world. The security models and policies are implemented over IPv6 infrastructures to cover various business cases and assessed...

Journal: :Innovative Issues and Approaches in Social Sciences 2013

Journal: :European Journal of Multidisciplinary Studies 2016

Journal: :Filozofija I Drustvo 2023

The concepts of security and freedom have long had an antagonistic relationship in the political sphere. Since Plato wrote his Republic, authors such as Machiavelli, Hobbes subsequent contractarians understood that some limitations on individual were necessary for sake collective security. This paradigm has since been inherited by different thinkers is key most theory proposals. Following this ...

1999
John Hale Pablo Galiasso Mauricio Papa Sujeet Shenoi

Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The ...

2010
Paramjeet Rawat

Hybrid Wireless Mesh Network is a special case of infrastructural mesh network which utilizes heterogeneous wireless networks for communication. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., can be accomplished through the gateway and bridging functions in the mesh routers. An integrated security mechani...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده علوم طبیعی 1391

in recent years many researchers have been focused on interaction of small molecules with dna. dna is generally the primary intracellular of anticancer drugs, so the interaction between small molecules and dna can cause dna damage in cancer cells, blocking the division of cancer cells and resulting in cell death. the flavonoids are a large group of polyphenolic natural products that are widely ...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید