نتایج جستجو برای: security environment

تعداد نتایج: 678646  

2009
Erich Gundlach

We use factor analysis to derive a robust measure of religiosity from items reported in five waves of the World Value Survey. Our measure of religiosity is negatively correlated with per capita income. Development apparently causes religiosity to fall to about half its pre-modern level. Most components of the demand for religion are reduced by development. The supply of religion declines once c...

1999
Nathalie Weiler Bernhard Plattner

Today, we face a growing interest in distributed businessto-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper, we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow managem...

Journal: :Information 2016
Tommaso Pecorella Luca Brilli Lorenzo Mucchi

This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a ...

2012
Rajendra Kumar Patel

Cloud computing is emerging technology in today’s era. Its popularity is because of flexibility, scalability, cost reduction and on-demand service. But there is the demand of security in User-Cloud environment, because of dependency increases on the cloud. Several companies chooses cloud environment for business prospective. So when we choose cloud environment we must think about the security i...

2014
Kewen Wang Yi Pan Wen-Zhan Song Weichao Wang Le Xie

Cyber Security of smart grids becomes more and more important to our everyday life for its wide implication in power systems, a critical infrastructure in a modern society. Many universities and corporations have put efforts in this field. However, there has been lack of emphasis on educational front of this important area. We believe that simulation systems designed for research purposes in th...

2017
P. Ananthi G. R. Sreekanth

In recent day, the enormous usage of cloud services leads to much concerned on cloud security. This paper primarily considers the important aspect of cloud security based on encryption. The users perform secure search on cloud environment using this method. Data stored in cloud are encrypted which ensure the privacy of the user; the files are encrypted before uploading. At the time of searching...

2014
Shweta Sharma Bharat Bhushan Shalini Sharma

The evolution of internet has introduced an immense change in the usage of information and communication technologies. The fast, easy-to-use and pay per usage criteria leads to cloud computing infrastructure. Cloud Computing provides network services to its clients as per their requirements. Nowadays, information security has become a serious issue while clientserver interaction in cloud comput...

2005
Yuri Demchenko Leon Gommans Cees T. A. M. de Laat Bas van Oudenaarde Andrew Tokmakoff Martin Snijders René van Buuren

The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the intent to build a flexible, customer-driven security infrastructure for open collaborative applications. The architecture is based on extended use of emerging Web Services and Grid security technologies combined with concepts ...

2016
Suman Sangwan

Cloud computing is continuously evolving and considered next generation architecture for computing. Typically, cloud computing is a combination of computing resources accessible via internet. Historically, the clients or the organizations store data in data centers with firewall and other security techniques to protect data against intruders. However, in cloud computing, since the data is store...

2009
Mala De

This paper proposes a pricing system for power system security in deregulated electricity market that includes voltage stability constraint in a multi-objective OPF problem. The OPF maximizes social benefit, as well as the distance from the voltage-collapse point. While pricing system security, ancillary service such as reactive power has been included. Effect of N–1 contingency on pricing is a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید