نتایج جستجو برای: security model
تعداد نتایج: 2246841 فیلتر نتایج به سال:
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
Security management has become a critical topic that supply systems have to handle on a daily basis. An integrated view is not in place yet, despite that related studies have existed in disparate pieces and keep on emerging. This
This paper addresses composability properties of component systems. By means of analysis of external relations among components, security problems associated with composition of the components are investigated. To solve these problems, two security models are presented. By comparing these two models, important properties of secure composition of component systems are identified.
This paper showcases MDSheet, a framework aimed at improving the engineering of spreadsheets. This framework is model-driven, and has been fully integrated under a spreadsheet system. Also, its practical interest has been demonstrated by several empirical studies.
The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...
The present study aims at identifying geopolitical components affecting the spatial planning of border regions in the East Azarbaijan province. The research is an applied research that has been carried out using statistical tests, path analysis and Promethean decision making model. The results of the research showed that social variables with r = 0.811, r = 0.662, political, r = 0.851, ranked f...
This paper presents a framework to analyze the security of data transmission protocols in wireless sensor network. This framework defines three attack models in terms of the adversary’s attacking ability, and provides an ideal model to verify whether a given protocol is secure or not under these three different attack models. Furthermore, we give a formal security definition under different att...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید