نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2013
Daniel F. García

Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...

2015
Keith D. Willett

The Department of Defense Strategy for Operating in Cyberspace (DSCOC) calls out the need for active cyber defense (ACD). The function of ACD is to provide sensing, sense-making, decision-making, and acting in cyber-relevant time in order to provide cyberspace defense before an adversary is able to bring about their desired effect. As automation increases and we move ever closer to automated cy...

2013
T. Männistö

The events of October 2010, where terrorists managed to get explosive devices onboard of three passenger aircrafts and two air freighters, demonstrated weaknesses of the international air cargo and airmail security. Ever since, postal security has gained interest among policymakers and authorities. This study augments the limited body of academic literature on the topic by demarcating areas of ...

Journal: :CoRR 2014
Naser Alajmi

A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requir...

1998
Estelle James

The escalating costs of traditional social security systems are forcing countries to reevaluate the formal programs that provide income maintenance support to the aging. This article suggests a reform strategy built around three systems, or “pillars,” to provide old-age security—a public pillar with mandatory participation, a private, mandatory savings plan, and a voluntary savings system. Thre...

2008
Bernadette Minton Rohan Williamson

Before the credit crisis that started in mid-2007, it was generally believed by top regulators that credit derivatives make banks sounder. In this paper, we investigate the validity of this view. We examine the use of credit derivatives by US bank holding companies with assets in excess of one billion dollars from 1999 to 2005. Using the Federal Reserve Bank of Chicago Bank Holding Company Data...

2012
M. Madhavi

Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and sc...

Journal: :Journal of aging & social policy 2004
John B Williamson Ce Shen

Until quite recently, the Chinese pension system was an enterprise-based, pay-as-you-go, defined benefit scheme. In 1995, the decision was made to shift to a multi-pillar scheme that included a second funded defined contribution pillar. The transition is proving difficult. This article outlines an alternative second pillar that may make more sense for China, a pay-as-you-go notional defined con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید