نتایج جستجو برای: internet service provider
تعداد نتایج: 497380 فیلتر نتایج به سال:
The Internet as a global networking infrastructure offers a wide range of possibilities to trade E-Commerce services, goods, and digital content. A new form of E-Commerce service is the transmission of video streams on demand with specifications for the Quality of Service (QoS). The service of providing streamed information contains the reliable transmission of data from sender to receiver via ...
Internet Service Provider, Arbeitgeber und Administratoren haben beim Einsatz von Spamund Virenfiltern viele rechtliche Details zu beachten. Scheint der Einsatz entsprechender Filtermechanismen vordergründig selbstverständlich und notwendig zu sein droht dem Administrator die Strafbarkeit und dem Unternehmen die Haftungsfalle. Arbeitsrechtliche Vorschriften machen den Einsatz von Filtern innerh...
According to Winkler [1], public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using public cloud services
We define a high-level model to mathematically capture the behavioural interface of abstract Virtual Providers (VP), their refinements and their composition into rich mediator structures. We show for a Virtual Internet Service Provider example how to use such a model for rigorously formulating and proving properties of interest.
In this paper we present a commercial protocol, developed by a norwegian start-up copmany, for using a mobile terminal as a password calculator that could potentially be used towards any service provider on the internet. We report our experiences by specification, validation, and analysis of the protocol, in particular the threat of phishing attacks is investigated.
This paper proposes an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database. The proposed model uses the distributed database technology for information storage and retrieval to make the system more reliable. The IDs information storage is secured by using cryptography mechanism of data conversion in the identit...
This article provides an introduction to Inter-net accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like " what is being paid for " and " who is being paid. " With respect to the question " what is bei...
Pricing Web services with different Quality of Service (QoS) classes over the Internet is a challenging scientific problem. Finding the optimal price per QoS class allows each provider to maximize its revenue and to solve the capacity planning problem. The most works presented in the literature focus on a monopolistic setting where one service provider sells one or more services of different cl...
Many applications of tunneling protocols such as PPTP [5] and L2TP [4] involve dial-up network access. Some, such as the provision of secure access to corporate intranets via the Internet, are characterized by voluntary tunneling: the tunnel is created at the request of the user for a specific purpose. Other applications involve compulsory tunneling: the tunnel is created without any action fro...
Mobile electronic commerce (m-commerce) is an emerging manifestation of internet electronic commerce that bridges the domains of Internet, mobile computing and wireless telecommunications in order to provide an array of sophisticated services (m-services) to mobile users. To date, much of the research in the area has concentrated on the problem of service discovery. However, once a service has ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید