نتایج جستجو برای: security and trust at five maturity levels performed

تعداد نتایج: 17233090  

2012
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم کشاورزی و منابع طبیعی گرگان - دانشکده منابع طبیعی گرگان 1391

چکیده: در این تحقیق تأثیر ملاس که یکی از محصولات جانبی صنایع قند می باشد به عنوان یک افزودنی مقاومت خشک جدید در بهبود پالایش پذیری و ویژگی های فیزیکی و مکانیکی مقوای کنگره ای کهنه (occ) مورد بررسی قرار گرفته شد. بدین منظور پنج سطح ملاس( 0،5، 10، 15 و 18%) و سه سطح درجه روانی(420،400و320 میلی لیتر)به عنوان فاکتورهای متغیر در نظر گرفته شد و برای هر تیمار کاغذهای دست ساز با مساحت 2cm200 و وزن پای...

2012
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

2012
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

2017
Gunnar Wahlgren Stewart Kowalski

Managing IT-related security incidents are a growing important issue facing the organizations in IT security risk management. We have used design science approach to develop an artifact to measure different organizations capabilities and maturity to handle IT-related security incidents. In this paper, we present how we have tested and will test the artifact on several different Swedish organiza...

2012
Amandeep Verma Manpreet Singh Gujral

An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and node level. The conventional security mechanisms deals with only protecting resources from unauthorized access,...

Journal: :journal of agricultural science and technology 2010
a. afzalzadeh f. d. de b. hovell

in western canada, durum wheat cultivars (triticum durum) have low to moderate lev-els of seed dormancy and are susceptible to pre-harvest sprouting. the aim of this study was to evaluate the dormancy level of canadian durum wheat cultivars and to identify tetraploid wheat accessions with elevated levels of seed dormancy. first, the level of seed dormancy and length of after-ripening of 17 nort...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1393

this thesis aims at putting together two of the vestest areas of study there is in humanities: bioethics and literature. the two novels in question, oryx and crake and the year of the flood, are considered as some of the most succssful examples of spculative fiction. in these novels the biological and environmental issues raised as looked at from a bioethics point of view.

abdo alrazagh Rostami Alireza Vajhi Majid Masoudifard Mehdi Salimi سارنگ سروری,

Twelve left camel forelimbs were collected, and ultrasonography was performed at five different levels around the metacarpal region. Limbs were then cut in the transverse plane at levels corresponding to the ultrasound images. Transverse and sagittal plane images were taken at each of the five levels, keeping all ultrasound imaging factors constant. Echogenicity, diameter, width and cross secti...

2005
Akash K Singh

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید