نتایج جستجو برای: security as a service

تعداد نتایج: 14071652  

جاویدی دشت بیاض, محمد حسین, رضوی, فرزاد, شریعتی دهاقان, حسین, عسگریان ابیانه, حسین,

An important factor to be considered in electric power system expansion planning is the security of service that the system is able to provide. In restructured power systems, variables such as agents’ profit or Locational Marginal Price (LMP) variances are considered in transmission expansion planning. To have a secure network this plan would be refined for simulated contingencies. This p...

2013
M. D. Samrajesh N. P. Gopalan

A multi-tenant application in Software as a Service (SaaS) is accessed by multiple organizations called tenants who have several users attached to them. Multi-tendency enhances resource utilization by effectively sharing resources and reducing cost, increasing productivity and online collaboration. However, providing a secure multi-tenant access to various tenants is still a challenge. Traditio...

2012
Amirreza Zarrabi Alireza Zarrabi

Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and signs of attack. IDS aroused the concern of users as an important computer ne...

2012
Tarun Goyal Ajit Singh Aakanksha Agrawal

Cloud Platform is a platform where cloud applications runs. It is an online platform, which works over internet. Cloud Platform has been constructed of three layers: “SaaS”, “PaaS”, and “IaaS”. Many companies in market i.e. Google, Microsoft, IBM etc used to provide cloud platform on per click basis and as well free of cost. The Google cloud platform is used to deploy cloud applications and the...

2016
Rahul Nijhawan Mukesh Rana Armando Fox Rean Griffith Anthony D. Joseph Randy Katz Andy Konwinski Gunho Lee Lu Cheng Linlin Wu Siddeswara Mayura Guru Samir Youcef Ammar Oulamara Claude Godart Sethuraman Subbiah Xiaohui Gu Robert WA Ayre Kerry Hinton Mohammad Razvi

The term Green Computing relates to processing this is certainly eco-friendly it's also termed as green IT. Green computing is renewable to environment as the significant objectives are to reduce the usage dangerous products, maximizing energy efficiency throughout the product‘s lifetime, and advertise the recyclability or biodegradability of factory waste. Green processing also focuses on redu...

Journal: :Computer Science (AGH) 2014
Mariusz Kapanowski Renata Slota Jacek Kitowski

Nowadays, service providers offer a lot of IT services in the public or private cloud. Clients can buy various kinds of services, such as SaaS, PaaS, etc. Recently, Backup as a Service (BaaS), a variety of SaaS, was introduced there. At the moment, there are several different BaaS’s available to archive data in the cloud, but they provide only a basic level of service quality. In this paper, we...

Journal: :international journal of management and business research 2013
m. g. matta s. verma

e-tourism has evolved as a mainstay business for tourist service providers. it plays an integral role in the dissemination of information and influencing consumer’s preferences and satisfaction. the purpose of this study is to identify the dimensions of service quality perceptions of consumers in e-tourism in the indian context. it also aims to understand the relative impact of these service qu...

ژورنال: بیمارستان 2014
برادران کاظم زاده , رضا , سپهری, محمد مهدی , فیروزی جهان تیغ, فرزاد ,

Background and purpose: Hospital is the largest and most important executive unit of healthcare system therefore, full consideration of how to assess its quality is of particular importance. A question is always raised as how to evaluate the quality of the services. The current study seeks to provide a fuzzy model for assessing the service quality in this healthcare sector. Material and method...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

introruction khawf in(iran)-herat and mazaresharif and shirkhan bandar in (afghanistan)-dushanbe in (tajikistan)_(kirgizstan)-kashghar in(china) project railway network is under construction that it is as a significant corridor for revitalizing silk road corridor in the region .at the present there are three different gauge in the region central asia with 1,520 mm gauge and turkey-islamic repu...

2017
Jonathan Chase Dusit Niyato Ping Wang Sivadon Chaisiri Ryan K L Ko

As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-asa-Service (SECaaS) paradigm allows customers to outsource security to the cloud, through the payment of a subscription fee. However, no security system is bulletproof, and even one successful attack can result in the loss of data and revenue worth millions of dollars. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید