نتایج جستجو برای: security sense

تعداد نتایج: 322501  

Journal: :Electr. Notes Theor. Comput. Sci. 2004
Annalisa Bossi Riccardo Focardi Damiano Macedonio Carla Piazza Sabina Rossi

We study information flow security properties which are persistent, in the sense that if a system is secure then all of its reachable states are secure too. We present a uniform characterization of these properties in terms of a general unwinding schema. This unwinding characterization allows us to prove several compositionality properties of the considered security classes. Moreover, we exploi...

2004
Carla Piazza Enrico Pivato Sabina Rossi

CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The considered properties are persistent, in the sense that they are preserved at each execution step. Moreover, they imply the Bisimulation-based Non Deducib...

Journal: :iranian journal of health sciences 0
hassan jafari school of public health, tehran university of medical sciences, tehran, iran. nasrin shaarbafchi zadeh health management and economics research center, iran university of medical sciences, tehran, iran. health management and economics research center, isfahan university of medical sciences, isfahan,iran maryam yaghoubi health management research center, baqiyatallah university of medical sciences, tehran, iran. hassan zahmatkesh health management and economics research center ,iran university of medical sciences, tehran, iran. saeidreza azami health management and economics research center ,iran university of medical sciences, tehran, iran.

background and purpose: the movement of spiritual leadership is a special kind of service-centered leadership which looks forward to progress and staff control. job involvement also emphasizes timely attendance of staff, feeling successful at work, and sense of optimism and success about the future of the organization. therefore, this study investigated the relation between spiritual leadership...

2014
Hamid Salim Stuart Madnick Hamid M. Salim Stuart E. Madnick

If we are to manage security risks more effectively in today’s complex and dynamic cyber environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec’s 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eig...

2013
R. Karthikeyan P. Mahalakshmi N. GowriShankar

The system automatically recognize activities around protected area to improve safety and security by multiplexing hundreds of video streams in real time. Object tracking method has important role in real time environment because it enables applications such as Security and surveillance to recognize people and to provide better sense of security using visual information. A novel algorithm for u...

2006
Jesper Buus Nielsen Louis Salvail

This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary’s knowledge in an information-theoretic or quantumtheoretic sense. They provide a very strong form of security because they cannot even be attacked by an adversary with unlimited computational resources, in contrast to the notion of computational security used otherwi...

2015
Chiaki Hara

This paper shows that, in markets with transaction costs, even if a redundant security does not even save individual investors’ total costs for their security trading, the prices of the other securities may well be different were it to not be available for trade, resulting in a different equilibrium consumption allocation. In this sense, a redundant security may give rise to the divergence of i...

Journal: :مدیریت شهری 0
azam daneshnejad mehrdad matin

plants as the life giving entities have important role in mental and physical health of human. in the modern time with expansion of the cities and increase  of industrial centers and living style change and decrease of social negligence about green spaces as the factor for mental diseases, altogether have been propounded for many psychologists and physicians. in this way considering green space...

1999
David Rosenthal Francis Fung

Two security domains that want to exchange information securely may need to agree on translations of Mandatory Access Control (MAC) labels of their information, if their MAC labels have a different syntax or semantics. It is desirable that these translations do not introduce any confidentiality violations. In this paper we present a property, the Security Level Translation Property (SLTP), whic...

2006
Mark D. Torgerson

This report discusses the possibility of creating meaningful security metrics for communication systems. In particular, we examine security metrics from an axiomatic standpoint and prove that it is not possible to measure trust in an absolute sense. We do not conclude that it is impossible to create a secure communication system; rather we argue that it is impossible to detect the occurrence. W...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید