نتایج جستجو برای: growth of task security
تعداد نتایج: 21269144 فیلتر نتایج به سال:
Current research in design of Context-Aware applications appears very technology focused, in particular software and sensor development and deployment rather than utilizing Human-Computer Interaction (HCI) principles such as task analysis to assist design of the applications. Developers specify what context-aware behavior to implement and determine what context information is needed based on in...
The authors discuss what is provable security in cryptography. Think that provable security is asymptotic, relative, and dynamic, and only a supplement to but not a replacement of exact security analysis. Because the conjecture P ≠ NP has not been proven yet, and it is possible in terms of the two incompleteness theorems of Kurt Gödel that there is some cryptosystem of which the security cannot...
From its inception on, the notion of management support systems (MS) has been closely linked to task structuredness. Using data collected with a survey questionnaire, this article presents the results of an empirical analysis of the relation between task structuredness and satisfaction with MS. Two dimensions of task structuredness are distinguished: task difficulty and task variability. The re...
Executing untrusted code while preserving security requires that the code be prevented from modifying memory or executing instructions except as explicitly allowed. Software-based fault isolation (SFI) or “sandboxing” enforces such a policy by rewriting the untrusted code at the instruction level. However, the original sandboxing technique of Wahbe et al. is applicable only to RISC architecture...
background and aim: function-based intervention have been shown to have positive increase in social skills of children with behavioral problems. the same findings can be potentially applied to the deaf and hard of hearing (d/hh) children. the present study examined the efficacy of differential reinforcement of alternative behavior (dra) on the on-task behaviors of deaf and hard of hearing st...
To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...
To inform the design of security policy, task models of password behaviour were constructed for different user groups – Computer Scientists, Administrative Staff and Students. These models identified internal and external constraints on user behaviour and the goals for password use within each group. Data were drawn from interviews and diaries of password use. Analyses indicated password securi...
With the widespread growth in applications for resourcelimited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. In this paper, two potent...
The current generation of IP, version 4 (IPv4), has been in use for more than 20 years since its inception in 1980 and has supported the Internet's rapid growth during that time. IPv4 has proven to be robust, easily implemented and interoperable. This is a tribute to its initial design. However, the current Internet has grown much bigger than was anticipated. The Internet Engineering Task Force...
Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید