نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to publickey encryption technologies. Digital certificates are vital in improving access to and use of new security technologies. Granting and revocation of digital certificates is overseen ...
jurisprudence, in its strict sense which is binding, is regarded as one of the important sources of law. this article seeks by relying on some judgments issued by general board of administrative justice court concerning the social security organization summarily investigate some deficiencies in performances of the social security organization and administrative justice court. in short, the enac...
this study examined the status and determinants of rural households’ food security in moyale district of pastoral area, oromia regional state, in ethiopia. both secondary and primary data were used for the study. the study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. analytical tools used include descriptive statistics, foster-greer...
Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...
The growing use of e-learning systems has been documented by numerous studies (Levy, 2005). Yet in spite of this enormous growth, little attention has been given to the issue of security of e-learning systems both in research and in practice. Security of e-learning systems has a unique challenge as these systems are accessed and managed via the Internet by thousands of users over hundreds of ne...
The overall use and development of ICT in developing countries has been faced with a wide range of constraints and challenges. These constraints may concern culture, infrastructure and education, and involve social, legal, political or economic issues. Numerous problems related to each of these issues have been observed. The problems may include, for example the absence of ICT policies, impleme...
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such models with respect to computational ones, is to explicitly represent the dependency of ciphertexts on random coins as labels. In order to make these label-based models useful, it seems natural to try to extend the und...
attracting foreign investment is a technique to achieve economic development, which requires establishment of appropriate legal and administrative infrastructure. in addition, host countries may ignore their public interest and national security. therefore, they have to maintain a balance between economic development and protection of national security. the concern over the national security as...
security is one of the most important human needs. researchers believe that the need for security has a strong and close relationship with the physical characteristics of the environment and people’s satisfaction. to study the relationship between security and environmental (physical and social) satisfaction, ‘’cpted’’ approach and its principals in design and environmental planning and urban l...
Deployment of distributed systems sets high requirements for procedures for the security testing of these systems. This work introduces: (1) a list of typical threats based on standards and actual practices; (2) an extended six-layered model for test generation mission on the basis of technical specifications and end-user requirements. Based on the list of typical threats and the multilayer mod...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید