نتایج جستجو برای: security as a service
تعداد نتایج: 14071652 فیلتر نتایج به سال:
Customer loyalty is a key driver of financial performance in service organizations. We investigate whether or not online customer loyalty can be increased through enhancing the perceived service quality, reducing perceived sacrifice and improving the perceived service outcome in the online service context with the possible availability of live help service technology. We also investigate the mo...
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...
Cloud-based applications benefit from the scalability and efficiency offered by server consolidation and shared facilities. However, the shared nature of cloud infrastructures may introduce threats stemming from the co-location and combination of untrusted components, in addition to typical risks due to the inevitable presence of weaknesses in the infrastructure itself. As a result, adversaries...
The logistics informatization of Specialized Farmers Cooperatives (SFC) plays an important role in the development of agriculture, and Softwareas-a-Service (SaaS) is the development trend of information technology (IT). Firstly, the state-of-the-art of IT on SFC and the enlightenment SaaS to the IT application in logistic are introduced. Then, analyzing of the characteristics of logistics manag...
This cumulative dissertation contributes to the question of the theoretical relationship between information technology (IT) governance and the adoption of IT-based innovations. IT governance has been described specifically as the locus of responsibility for IT functions within organizations. Innovation adoption in this context refers to the decision of an organization to make use of a technolo...
Cloud Security threats have greatly hindered the development of Cloud Computing and the promotion of cloud application, so how to protect the data stored in the cloud is not only the core issue of security, but also the biggest challenge of development. As these problems above, a trust-control architecture based on the concept of Cloud Storage Service was creatively proposed. Based on the struc...
With increasing technology demand for the cloud application is also increasing. Due to this security demands are also increasing. A user can access a cloud services from anywhere and at any time or almost instantly. These features make cloud computing so flexible and prone to risk. Therefore there are possibilities of lacking confidentiality, integrity and authentication among the cloud users. ...
In this paper, an integrated development environment for service-oriented Grid applications integrated into the Eclipse platform is presented. Its design is based on model-driven software development principles, allowing domain experts to rapidly develop Grid applications by hiding the complexities of the Grid middleware. The functionality of the three main components supporting service creatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید