نتایج جستجو برای: security and trust at five maturity levels performed
تعداد نتایج: 17233090 فیلتر نتایج به سال:
In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...
In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-b...
Processes that are related to the identification and the authentication of persons and other legal entities have been necessarily existing and functioning for a while in public administration and business. Information Society offers new e-services for citizens and businesses, which dramatically change the administration and results in additional challenges, risks and opportunities. Citizen’s co...
Background: Patients’ trust in their physicians can affect therapeutic outcomes. Measurement of patient’s trust levels is a helpful approach for policymakers in healthcare systems. Aim: The present study was targeted toward the translation and psychometric assessment of patients’ trust in midwifery care questionnaire. Method: This cross-sectional study was conducted on 210 female patients refer...
Consumer trust has been recognised as a critical component of the electronic banking industry. Factors that affect trust and its development vary from traditional banking services because of the uncertain nature of the online environment. Extensive efforts in identifying factors that affect trust have shown security to play an important role in its development. Every step in the online banking ...
With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecti...
the rise and stublishment of safavid dynasty was depend on triangle of tasavof, tashayo and royalty, kings legitimized their power upon these. therefore for the understanding the functions of that period we must explore the role of this elements. although application and emphsise upon dignities such as; complete mentor (morshede kamel), deputy of absent imam (nayebe imame ghayeb), and god’s sha...
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید