نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security...
Internet-based control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboration and data sharing between operators from geographically dispersed locations. However, connection to an open network and the use of universal technology presents new problems that did not ...
security is fundamental right and prerequisite of upgrade welfare and health of the people. sense of security is the key issues in any society and necessary introduction for the political and social military life. sense of security was related citizens' mental sense of security and hence it accompanies many queries and issues around self about secure or insecure of it. women's are vulnerable gr...
In this paper we introduce a new, flexible radio access stratum security architecture for 5G mobile networks that supports a dynamic, flexible radio access network with multiple different security termination points for the control and user plane communication between a mobile device and the network. We describe key refreshing methods that allow to refresh user plane keys for individual radio l...
A recurring security scenario involves the problem of removing the access rights of an employee upon employee termination. A solution is presented in the form of procedures and an infrastructure. Operationally, sensors track security-related user operations (e.g. password use and object accesses) to determine the true access rights associated with a user. Security administrators combine that in...
The pervasive utilization of social media sites within both the personal and commercial settings introduce new challenges to the information security sector. Modern network security platforms and procedures fall short in the detection and prevention of this emerging threat. Our research demonstrates new considerations network security professionals must consider when assessing and protecting in...
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and cryptographic keys in an Internet environment. A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options ...
this paper argues for a broader emphasis on sustainable security and smart power, for examining both opportunities as well as threats to security. sustainable security is a new concept in the security studies. deep attention to all possible threats against human life is necessary for continuation of security in a sustainable and dynamic base. this aim can be achieved in a highest level by mergi...
background: in recent years, the concept of health security has received an international dimension. however, despite evident links between health and security the concept of health security is not used in either academic or political discourse in serbia. it comes as no surprise then that even though the issue of security challenges is present in serbian legislation, it has not been incorporate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید