نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
A cantilever beam is completely fixed at one end and free at the other. In the case of cantilevers, the support conditions in the transverse plane affect the moment pattern. For design purposes, it is convenient to use the concept of notional effective length, k, which would include both loading and support effects. The notional effective length is defined as the length of the notionally simply...
This paper reports results of an empirical examination of the facilitating role of experimentation and socialisation in enhancing individual knowledge and performance in decision making. A laboratory experiment was conducted using 28 graduate students as voluntary subjects. Performance of actual subjects was compared with that of their nominal naive and optimal counterparts. Results indicate th...
We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searc...
Security is the major obstacles of the long dreamed vision of cloud computing. The sensitive application data are moved into the cloud data centres and run on virtual computing resources in the form of virtual device. The user concerns about cloud computing is its security. Enterprise data centres, Internet Data Centres (IDC) and service provider’s offer racks and networks, and the remaining de...
Today, many governments tend to propose e-services to their citizens. However, implementing an eGovernment environment shall face up to several security challenges including integrating security requirements coming from multiple stakeholders. In this article, we analyze the conflicts that can occur between eGovernment security requirements. Since these security requirements can contain both aut...
In the age of smart and connected vehicles, there are significant issues in providing security for in-vehicle networking. Many security efforts for in-vehicle networks are still insufficient to build a lightweight security mechanism. Typically, it comes from the limitations of Controller Area Network (CAN) protocol common to in-vehicle network. We propose a lightweight authentication method bas...
Recently when huge amount of documents and web contents are available, so security of data is somewhat difficult. Since most of the systems are based on the distributed network so the sharing of data and more important the security of data on such systems are important.It is a trend to store data in to third party servers for either sharing or cost effective storage. But this private data shoul...
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization ...
As network components grow larger and more diverse, and as securing them on a host-by-host basis grow more difficult, more sites are turning to a network security model. We concentrate on controlling network access to various hosts and the services they offer, rather than on securing them one by one with a network security model. We present how the policy rules from vulnerabilities stored in SV...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید