نتایج جستجو برای: security and trust at five maturity levels performed
تعداد نتایج: 17233090 فیلتر نتایج به سال:
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
چکیده: در این تحقیق تأثیر ملاس که یکی از محصولات جانبی صنایع قند می باشد به عنوان یک افزودنی مقاومت خشک جدید در بهبود پالایش پذیری و ویژگی های فیزیکی و مکانیکی مقوای کنگره ای کهنه (occ) مورد بررسی قرار گرفته شد. بدین منظور پنج سطح ملاس( 0،5، 10، 15 و 18%) و سه سطح درجه روانی(420،400و320 میلی لیتر)به عنوان فاکتورهای متغیر در نظر گرفته شد و برای هر تیمار کاغذهای دست ساز با مساحت 2cm200 و وزن پای...
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
Managing IT-related security incidents are a growing important issue facing the organizations in IT security risk management. We have used design science approach to develop an artifact to measure different organizations capabilities and maturity to handle IT-related security incidents. In this paper, we present how we have tested and will test the artifact on several different Swedish organiza...
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and node level. The conventional security mechanisms deals with only protecting resources from unauthorized access,...
in western canada, durum wheat cultivars (triticum durum) have low to moderate lev-els of seed dormancy and are susceptible to pre-harvest sprouting. the aim of this study was to evaluate the dormancy level of canadian durum wheat cultivars and to identify tetraploid wheat accessions with elevated levels of seed dormancy. first, the level of seed dormancy and length of after-ripening of 17 nort...
this thesis aims at putting together two of the vestest areas of study there is in humanities: bioethics and literature. the two novels in question, oryx and crake and the year of the flood, are considered as some of the most succssful examples of spculative fiction. in these novels the biological and environmental issues raised as looked at from a bioethics point of view.
Twelve left camel forelimbs were collected, and ultrasonography was performed at five different levels around the metacarpal region. Limbs were then cut in the transverse plane at levels corresponding to the ultrasound images. Transverse and sagittal plane images were taken at each of the five levels, keeping all ultrasound imaging factors constant. Echogenicity, diameter, width and cross secti...
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید