نتایج جستجو برای: knowledge storage and security
تعداد نتایج: 16904841 فیلتر نتایج به سال:
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data reposi...
Users frequently reuse their passwords when authenticating to various online services. Combined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to the security of the user’s account information. In this paper, we propose several protocols that can allow a user to use a single password to authenticate to multiple services securely. All our constructions provab...
The introduction of hosted environments to computing has brought a lot of change in the industry. With the advent of Infrastructure-as-a-Service, the concept of renting data stores is catching up. Security for the data in a hosted environment is an alarming issue. The paper focuses on cloud data storage security. We propose a security model to maintain the data store. This model ensures the saf...
Background and aim: HIV positive patients encounter a number of social problems in Iran such as discrimination or rejection at their workplace. Lack of knowledge about labour and social security regulations (LSS) among these sufferers make them incapable of restoring their rights. The main objective of this study is to measure the level of awareness of LSS laws among the HIV-positiv...
During the five years of existence of this minitrack, we have published fourteen papers that focus on the intersection of knowledge management and organizational or individual security. Ilvonen, Jusilla, Kärkkäinen, and Paivarint (2015), Ilvonen, Alnne, Helander, and Vayrunen (2016), and Sarigianni, Thallmann, and Manhart (2016) focus on how to protect shared knowledge either within the organiz...
This paper presents an independent security review of a popular encrypted cloud storage service (ECS) SpiderOakONE. Contrary to previous work analyzing similar programs, we formally define a minimal security requirements for confidentiality in ECS which takes into account the possibility that the ECS actively turns against its users in an attempt to break the confidentiality of the users’ data....
background and objectives: the aim of this study was to explore the food safety knowledge and behavior of housewives in the city of tehran, iran in 2015. materials and methods: in this qualitative study 12 focus group discussions by directed content analysis method (n= 96), were conducted among the women who were responsible for food handling in their households in 10 health centers. each sessi...
The protection of IPRs in agriculture and its related areas affects food security directly and indirectly. Right to Food and IPRs has both recognized in human rights instruments and states have the duty to protect and provide these rights. However the approaches about the relationship between IPRs and food security have been inconsistent so far. This inconsistency about the interaction between ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید