نتایج جستجو برای: growth of task security
تعداد نتایج: 21269144 فیلتر نتایج به سال:
“Security” parallels “health” in that it is commonly defined as the absence of its negation, “illness”. In fact, the concept of security challenges any attempt to be objectively apprehended, except as an absence of insecurity. Illness, however, can be identified wherever and whenever by sets of visible symptoms that are indicators of regularities, usually bringing forth the same effects. This i...
Abstract Cloud computing is an extremely important infrastructure used to perform tasks over processing units. Despite its numerous benefits, a cloud platform has several challenges preventing it from carrying out efficient workflow submission. One of these linked task scheduling. An optimization problem related this the maximal determination scheduling criteria. Existing methods have been unab...
The paper develops an overlapping generations model that highlights interactions between social security, unemployment and growth.The social security system has two components: old age pensions and unemployment insurance. Pensions have a direct effect on economic growth. Both pensions and unemployment benefits influence equilibrium unemployment caused by wage bargaining. Since unemployment impa...
background: in recent years, the concept of health security has received an international dimension. however, despite evident links between health and security the concept of health security is not used in either academic or political discourse in serbia. it comes as no surprise then that even though the issue of security challenges is present in serbian legislation, it has not been incorporate...
With the expansion of WFMS(workflow management systems) across the Internet, collaboration among enterprises increase. The security problems of Intranet-based WFMS, which is operated on Intranet, are critical, and the effectiveness of Internet-Based WFMSs is deeply influenced by security. For the security of Internet-Based WFMSs, this study introduces the Login Agent, the Security Agent, and Ta...
With the explosive growth of the Internet and the distributed applications it supports, there is a pressing need for secure group communications – the ability of a group of agents to communicate securely with each other while allowing members to join or leave the group. Prompted by the success of other researchers in applying finite-state model-checking tools to the verification of small securi...
E-business is one of the driving factors for the growth of the worldwide economy. But in parallel to the upsurge of the digital trade the cyberspace became also a main attraction for criminals. Today main parts of the Internet are still outside of traditional national legislation and law enforcement. Security is therefore a task that can not be delegated to the government only. Each party in an...
Measuring information security has traditionally been daunting task due to the lack of proper tools. Even more, organizations are concerned about suffering security breaches but, most of the time, justifying security investment is a tough task in the absence of a tangible measurement. In this paper, we propose an approach to quantitatively measure different aspects of information security. The ...
We propose an effective administration model using organizational structure for a decentralized role-based access control environment. Access control administration is a critical issue for large organizations and information systems. A large organization needs decentralized access control by multiple security officers because it has many users and information objects, and a single security offi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید