نتایج جستجو برای: security order
تعداد نتایج: 1066303 فیلتر نتایج به سال:
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification. This approach is not sufficient to objectively consider the actual need for security. Therefore the approach proposed in this paper considers relevant security ...
Masking is a widely used countermeasure to protect block cipher implementations against side-channel attacks. The principle is to split every sensitive intermediate variable occurring in the computation into d + 1 shares, where d is called the masking order and plays the role of a security parameter. A masked implementation is then said to achieve d-order security if any set of d (or less) inte...
The objective study was to investigate the effects of social capital on sustainability security in the villages the border areas. Statistical population including the villages of the central city of Saravan are heads of households (N= 9946). 421 households (23 villages) using Cochran formula and simple random sampling were selected. for the analysis data, descriptive and inferential statistics ...
One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that the...
In today’s world, IT security plays a critical role in different organizations, yet little is known about IT security in the context of organizations. This paper addresses this issue based on qualitative description analysis of 10 interviews with IT security practitioners from small to medium size organizations. Our results revealed the required knowledge and skills for effective IT security, I...
Introduction and Objective: Depression is a mental disease which has significant negative effects of lives. Food insecurity means insufficient and unsafe access to food in order to have a healthy and active life which can affect the physical and mental health of the society In Iran, no study has ever covered The Study of Association between food insecurity and depression. The present study aims...
Abstract Introduction: Today, increased life expectancy, reduced mortality rates, and improved health conditions caused to an increase in number of elderly people, as one of the vulnerable groups in the society. On the other hand, food security is one of the necessary prerequisites for the health of the elderly people. Therefore, the present study intended to investigate the food securit...
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
An eternal $m$-secure set of a graph $G = (V,E)$ is aset $S_0subseteq V$ that can defend against any sequence ofsingle-vertex attacks by means of multiple-guard shifts along theedges of $G$. A suitable placement of the guards is called aneternal $m$-secure set. The eternal $m$-security number$sigma_m(G)$ is the minimum cardinality among all eternal$m$-secure sets in $G$. An edge $uvin E(G)$ is ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید