نتایج جستجو برای: security and trust at five maturity levels performed

تعداد نتایج: 17233090  

Ali Hashemianfar Ali Hejazifar, Shaaban Bozorgi

Social trust is one of the important factors of the social relations, the social order and also the social capital. It also possesses an effective role in the development of the society. Its increase and decrease will influence on the primary groups and institutions to the entire society. Social trust is influenced by various factors and variables. The change in these factors will change the ex...

2006
Yufeng Wang Yoshiaki Hori Kouichi SAKURAI

The traditional approach of providing network security has been to borrow tools from cryptography and authentication. With the Internet growing into highly decentralized and self-organizing networks, the open and anonymous nature of these networks makes them vulnerable to attacks from malicious and self-interested peers. So, we argue that the conventional view of security based on cryptography ...

1999
Kristian Schelderup Jon Ølnes

It is obvious that a prerequisite for use of mobile agent systems in many settings is that security is taken care of. A proper trust model is necessary in order to build security. A lot of security issues arise if the trust model implies that not all hosts are trusted. This paper discusses trust models, examines the security issues, and points at possible directions for solutions in terms of se...

Journal: :RFC 2007
Howard Eland Russ Mundy Steve Crocker Suresh Krishnaswamy

Every DNS security-aware resolver must have at least one Trust Anchor to use as the basis for validating responses from DNS signed zones. For various reasons, most DNS security-aware resolvers are expected to have several Trust Anchors. For some operations, manual monitoring and updating of Trust Anchors may be feasible, but many operations will require automated methods for updating Trust Anch...

2016
Ben Fetler Carlo Harpes

Measuring the continuous improvement of Information Security Management Systems (ISMS) is often neglected as most organizations do not know how to extract keyindicators that could be used for this purpose. The underlying work presents a six-level maturity model which can be fully integrated in a risk management tool and helps to define key indicators for measuring the improvement of an ISMS. Fu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده روانشناسی و علوم تربیتی 1389

چکیده : تحقیق حاضر به منظور مقایسه دو روش تدریس انتزاعی و تدریس در متن بر یادگیری دستور زبان ایتالیاییِ زبان آموزان ترم 1 مدرسه ایتالیایی تهران در تابستان 89 صورت گرفت. روش تحقیق آزمایشی بوده و پژوهش بر 30 نفر از زبان آموزان مدرسه ایتالیایی تهران که بصورت تصادفی به 2 گروه جایگزین شدند صورت گرفت. ابزار تحقیق آزمون 30 سوالی تستی از بانک سوالات استاندارد شده بود که به تصادف انتخاب شده بودند.روشهای...

2014
Ankita Jain Shubha Dubey Anurag Jain

Privacy preserving data mining is one of the most demanding research areas within the data mining community. In many cases, multiple parties may wish to share aggregate private data without disclosing any private information at user side. Over the last few years this has naturally lead to a growing interest in security or privacy issues in data mining. More precisely, it became clear that disco...

Journal: :Computers & Electrical Engineering 2014
Apostolos P. Fournaris Nicolas Sklavos

Embedded systems have found a very strong foothold in global Information Technology (IT) market since they can provide very specialized and intricate functionality to a wide range of products. On the other hand, the migration of IT functionality to a plethora of new smart devices (like mobile phones, cars, aviation, game or households machines) has enabled the collection of a considerable numbe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1391

in this work, a novel and fast method for direct analysis of volatile compounds (davc) of medicinal plants has been developed by holding a filament from different parts of a plant in the gc injection port. the extraction and analysis of volatile components of a small amount of plant were carried out in one-step without any sample preparation. after optimization of temperature, extraction time a...

2011
Chee-Sok Tan William Yeoh Tunku Abdul Rahman

The implementation of an enterprise-level business intelligence initiative is a large-scale and complex undertaking, involving significant expenditure and multiple stakeholders over a lengthy period. It is therefore imperative to have systematic guidelines for business intelligence stakeholders in referring business intelligence maturity levels. Draw upon the prudent concepts of the Capability ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید