نتایج جستجو برای: knowledge storage and security

تعداد نتایج: 16904841  

Journal: :IJMCMC 2014
Wasan Shaker Awad Hanin Mohammed Abdullah

Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizat...

2013
Arbob Ahmad Robert Harper

The non-interference (NI) property defines a program to be secure if changes to high-security inputs cannot alter the values of lowsecurity outputs. NI indirectly states the epistemic property that no low-security principal acquires knowledge of high-security data. We consider a directly epistemic account of information flow (IF) security focusing on the knowledge flows engendered by the progra...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract the present research is prepared to study the culture of tea consuming among iranian. the case group which was statistically used for this study was people of lahijan , about four hundred wich were chosen according to their age , gender , education and occupation , randomly selected to fill the questionnaire . then the data collected through the questionnaire was analyzed according ...

Journal: :سیاست 0
نبی الله ابراهیمی

explanation and evaluation of the book “rational choice and security studies, stephen walt and its critics”, edited by brown owen and lynn josomiller, has taken place in fact in the direction of exploration of the knowledge of security studies in international relations. in terms, examination of walt’s rational choice approach, and the formal-mathematical model, can help us to present a clear a...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و زبانهای خارجی 1390

the frame semantic theory is a nascent approach in the area of translation studies which goes beyond the linguistic barriers and helps us to incorporate cognitive and cultural factors to the study of translation. based on rojos analytical model (2002b), which centered in the frames or knowledge structures activated in the text, the present research explores the various translation problems that...

2006
Jesper Buus Nielsen Louis Salvail

This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary’s knowledge in an information-theoretic or quantumtheoretic sense. They provide a very strong form of security because they cannot even be attacked by an adversary with unlimited computational resources, in contrast to the notion of computational security used otherwi...

Journal: Evidence Based Care 2018

Background: Food insecurity denotes failure to provide adequate food. Knowledge and attitude play a key role in food security, which is of paramount importance in the first two years of life. Aim: This study aimed to evaluate mothers' knowledge and attitude towards food security in complementary feeding of 1-2 year-old offspring. Method: Using a cross-sectional study, 400 mothers of children 1-...

2013
P. Prathyusha

Cloud storage permits users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software package management. Though the advantages are clear, such a service is addition relinquishing users’ physical possession of their outsourced knowledge, which necessarily poses new security risks towards the correctness of th...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی مشهد - دانشکده دندانپزشکی 1390

objective: the objective of this study was to investigate the invitro fluoride release of four new self-adhesive resin cements; set (sdi, australia), breeze (pentron, usa), embrace wetbond (pulpdent, usa), g-cem (gc, japan) and to assess the bonding performance of these self-adhesive resin cements for bonding of orthodontic brackets. materials and methods: for fluoride release experiment, six ...

Journal: :Inf. Sci. 2009
Abhishek Parakh Subhash C. Kak

It is advantageous to use implicit security for online data storage in a cloud computing environment. We describe the use of a data partitioning scheme for implementing such security involving the roots of a polynomial in finite field. The partitions are stored on randomly chosen servers on the network and they need to be retrieved to recreate the original data. Data reconstruction requires acc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید