نتایج جستجو برای: security level

تعداد نتایج: 1235388  

2004
Baiyan Li Ruonan Rao Minglu Li Jinyuan You

The Grid Security Infrastructure (GSI) proposed and implemented in Globus Toolkit has been a widely accepted solution for the security of grids in recent years. But there is no formal analysis or modelling on security mechanisms of GSI emerging in the literature yet. In this paper, we propose a formal logic, and formalize those primary security mechanisms using the logic. Our formalism not only...

ژورنال: طلوع بهداشت یزد 2016
فلاح تفتی, لیا, فلاح زاده, حسین, مظفری خسروی, حسن, نجارزاده, آزاده,

Abstract Introduction: Today, increased life expectancy, reduced mortality rates, and improved health conditions caused to an increase in number of elderly people, as one of the vulnerable groups in the society. On the other hand, food security is one of the necessary prerequisites for the health of the elderly people. Therefore, the present study intended to investigate the food securit...

Journal: :Internet Research 1998
Steven Furnell P. D. Onions Martin Knahl Peter W. Sanders Udo Bleimann U. Gojny H. F. Röder

The paper considers the requirement for information security within the domain of online distance learning. A generic module structure is presented which represents a high level abstraction of the different stages of the educational process. This leads into a discussion of the main security issues that must be considered at each stage. These various requirements are being addressed in practice ...

2011
Esteban Mocskos

As a network or cyber security experimenter, have you ever wished for an ability to analyze your experiment with high-level questions such as “did my experiment run as expected?” or “did X occur in my experiment?” Have you ever felt the tedium of manual analysis or writing problem-specific tools for every situation and wished for a better approach? Read on as ThirdEye might just be the right to...

M. R. Aghamohammadi,

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

2013
Dai Nishioka Yoshia Saito Yuko Murayama

In this research, we investigate users’ subjective sense of security, which we call Anshin, the sense of security in Japanese. Our research goal is to create a guideline of providing Anshin about information security for users. In this paper, we report the relationship between users level of knowledge and Anshin factors about information security. We conducted a Web survey with 1030 subjects wi...

Ali Reza Heidarian, Mohamad Khorshidi , Reza Jamshidi , Seyed Ebrahim Jafari Kelarijani ,

 Abstract Background: Patient satisfaction is affected by hospital services and may have an effect on the cultural, social and personal conditions of the people living in the region. This research aimed to evaluate the patient satisfaction in social security hospitals in Mazandaran province. Methods: From Spring 2012 to Summer 2013, all patients admitted to social security hospitals in Maza...

Journal: :isecure, the isc international journal of information security 0
t. y. rezapour department of computer engineering, university of guilan, rasht, iran department of information technology, ports and maritime organization, tehran, iran r. ebrahimi atani department of computer engineering, university of guilan, rasht, iran m. s. abolghasemi department of computer engineering, university of guilan, rasht, iran

wireless sensor networks (wsns) have many applications in the areas of commercial, military and environmental requirements. regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. a basic approach for preparing a secure wireless communication in wsns, is to propose an efficient cryptographic key management protocol be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید