نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
The real challenge of business environment is derived from a situation where organizations need to find opportunities on how to introduce ideas and new products to market that provide future earnings stream. Management accounting is used as a tool in this process and provides information on opportunities and threats. The purpose of this research is to explain the role of management accounting i...
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
a very challenging task because of their dissimilarities with the conventional wireless networks. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of WSNs. In this paper we have proposed a set of cellular automata based security algorithms (CAWS) which consists of CAKD, a Cellular Automata (CA) based key management algorithm and CASC, a...
Today several instruments exist to decrease air pollution. The paper discusses pollution taxes, emission trading permits and green certificates applied to reduce the CO2-emissions in the electricity sector. It then investigates how the different mechanisms behind these three instruments can possibly be combined. The proposed approach is to introduce the concept of zero-emission certificates (ZE...
background: quality management is one of the most effective strategies for improving the health systems performance in developed and developing countries. the main goal of this study was identifying the most important aspects of quality management and preparing an appropriate model for health system. method: this research was a comparative study on quality management models in the health system...
Business/IT alignment is a key management issue and has been largely investigated. Requirement engineering now deals with goal modeling and enterprise modeling; it addresses the "function integration" but doesn't explicitly addresses the "strategic fit". The assumption of this talk is that making explicit the business model can contribute to improving the business/IT alignment. The role of a fo...
In this paper, we introduce a new concept called “IdentityBased Broadcasting Encryption” (IBBE), which can be applied to dynamic key management in secure broadcasting. Based on this new concept, in the proposed system a broadcaster can dynamically add or remove a user to or from the receiver group without any involvement of users. We classify our systems into three different scenarios and give ...
Modern industrial facilities have command and control systems. These industrial command and control systems are commonly called supervisory control and data acquisition (SCADA).In this paper, we analyze several security issues in SCADA systems. We classify these issues based on key management, vulnerability and survivability. Using this standardized security techniques we can easily compare & c...
In this thesis, a mathematical model that describes a “Unique Constraint Domain” is defined. Following, the “Ordered Unique Constraint Domain” is also mathematically defined. With those definitions, a cross-domain ordering is also defined. Then it is shown that relationships between tables in a Relational Database Management System can be defined in other forms than the usual ways, using cross-...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (PKI). A PKI, in turn, consists of one or several certification authorities (CAs) that issue and revoke certificates for users and other CAs. Contrary to its conceptual simplicity, the establishment and operational maint...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید