نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2003
Eric Wohlstadter Premkumar Devanbu

Some “non-” or “extra-functional” features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes such features hard to design, implement, and maintain. Implementing such features within a single platform, using a single language, is hard enough. With distributed, heterogeneous (DH ) systems, these features induce complex implementations...

2015
Uwe Breitenbücher Tobias Binz Oliver Kopp Frank Leymann Matthias Wieland

The automated provisioning of complex composite Cloud applications is a major issue and of vital importance in Cloud computing. It is key to enable Cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered by several technologies on different ...

2002
Guofei Jiang

The infrastructure networks of greatest importance to national security and stability include telecommunications, electrical power systems, gas and oil, banking and finance, transportation, water supply systems, government and emergency services. After the September 11, 2001 WTC attack, more sensors and surveillance systems are being deployed to monitor these critical infrastructures. While the...

Journal: :Computing Systems 1994
Willis H. Ware

For the purposes of the present discussion , a network is the telecommunications arrangement for transporting digital trafñc from place to place, and the boundary is considered to be at the interface between it and subscriber systems. Both homogeneous networks and heterogeneous networks are described and discussed in detail, and security concerns and threats are presented. The focus of concern ...

Journal: :Online Information Review 2003
Mariemma Inmaculada Yagüe del Valle Antonio Maña Javier López Ernesto Pimentel José M. Troya

Distributed systems usually contain objects with heterogeneous security requirements that pose important challenges on the underlying security mechanisms and especially in access control systems. Access control in distributed systems often relies on centralized security administration. Existing solutions for distributed access control do not provide the flexibility and manageability required. T...

2002
Javier Lopez Antonio Maña Ernesto Pimentel José M. Troya Mariemma Inmaculada Yagüe del Valle

Distributed systems usually contain objects with heterogeneous security requirements that pose important challenges on the underlying security mechanisms and especially in access control systems. Access control in distributed systems often relies on centralized security administration. Existing solutions for distributed access control do not provide the flexibility and manageability required. T...

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Reza Azarderakhsh Arash Reyhani-Masoleh

Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent researc...

2018
Shanker Shreejith Suhaib A. Fahmy

The computing integrated in modern vehicles has increased dramatically over the last decade, with many cars having over 50 compute units controlling critical and non-critical functions. These ECUs communicate over increasingly complex and heterogeneous networks, and these systems combined present challenges in terms of scalability, validation, and security. In this article, we present the conce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید