نتایج جستجو برای: security and trust at five maturity levels performed

تعداد نتایج: 17233090  

2006
Fabio Martinelli Marinella Petrocchi

In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Fabio Martinelli Marinella Petrocchi

In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...

Journal: :CIT 2009
Balint Molnar Andrea Ko

Processes that are related to the identification and the authentication of persons and other legal entities have been necessarily existing and functioning for a while in public administration and business. Information Society offers new e-services for citizens and businesses, which dramatically change the administration and results in additional challenges, risks and opportunities. Citizen’s co...

Journal: Evidence Based Care 2019

Background: Patients’ trust in their physicians can affect therapeutic outcomes. Measurement of patient’s trust levels is a helpful approach for policymakers in healthcare systems. Aim: The present study was targeted toward the translation and psychometric assessment of patients’ trust in midwifery care questionnaire. Method: This cross-sectional study was conducted on 210 female patients refer...

2008

Consumer trust has been recognised as a critical component of the electronic banking industry. Factors that affect trust and its development vary from traditional banking services because of the uncertain nature of the online environment. Extensive efforts in identifying factors that affect trust have shown security to play an important role in its development. Every step in the online banking ...

Journal: :CoRR 2009
Safieh Siadat Amir Masoud Rahmani Mehran Mohsenzadeh

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecti...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده علوم انسانی 1391

the rise and stublishment of safavid dynasty was depend on triangle of tasavof, tashayo and royalty, kings legitimized their power upon these. therefore for the understanding the functions of that period we must explore the role of this elements. although application and emphsise upon dignities such as; complete mentor (morshede kamel), deputy of absent imam (nayebe imame ghayeb), and god’s sha...

2012
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

2012
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید