نتایج جستجو برای: security model

تعداد نتایج: 2246841  

2014
Jakub Breier

Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...

2007
Xiangyang Li Charu Chandra

Security management has become a critical topic that supply systems have to handle on a daily basis. An integrated view is not in place yet, despite that related studies have existed in disparate pieces and keep on emerging. This

1992
John A. McDermid Qi Shi

This paper addresses composability properties of component systems. By means of analysis of external relations among components, security problems associated with composition of the components are investigated. To solve these problems, two security models are presented. By comparing these two models, important properties of secure composition of component systems are identified.

2014
Jácome Cunha João Paulo Fernandes Jorge Mendes Rui Pereira João Saraiva

This paper showcases MDSheet, a framework aimed at improving the engineering of spreadsheets. This framework is model-driven, and has been fully integrated under a spreadsheet system. Also, its practical interest has been demonstrated by several empirical studies.

ژورنال: اقتصاد مقداری 2017

The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...

The present study aims at identifying geopolitical components affecting the spatial planning of border regions in the East Azarbaijan province. The research is an applied research that has been carried out using statistical tests, path analysis and Promethean decision making model. The results of the research showed that social variables with r = 0.811, r = 0.662, political, r = 0.851, ranked f...

Journal: :J. Inf. Sci. Eng. 2009
Mi Wen Ling Dong Yanfei Zheng Kefei Chen

This paper presents a framework to analyze the security of data transmission protocols in wireless sensor network. This framework defines three attack models in terms of the adversary’s attacking ability, and provides an ideal model to verify whether a given protocol is secure or not under these three different attack models. Furthermore, we give a formal security definition under different att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید