نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2007
James Macdonell Kay Zemoudeh

The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to publickey encryption technologies. Digital certificates are vital in improving access to and use of new security technologies. Granting and revocation of digital certificates is overseen ...

Journal: :مطالعات حقوق خصوصی 0
علی انصاری دانشکده ادبیات و علوم انسانی دانشگاه تربیت معلم حجت مبیّن دانشکده حقوق و علوم سیاسی دانشگاه تهران

jurisprudence, in its strict sense which is binding, is regarded as one of the important sources of law. this article seeks by relying on some judgments issued by general board of administrative justice court concerning the social security organization summarily investigate some deficiencies in performances of the social security organization and administrative justice court. in short, the enac...

Journal: :international journal of agricultural science, research and technology in extension and education systems 2012
amsalu mitiku bekabil fufa beyene tadese

this study examined the status and determinants of rural households’ food security in moyale district of pastoral area, oromia regional state, in ethiopia. both secondary and primary data were used for the study. the study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. analytical tools used include descriptive statistics, foster-greer...

ژورنال: حقوق پزشکی 2017
آزاد دوین, علی, زمانی, سید قاسم,

Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...

Journal: :J. Cases on Inf. Techn. 2006
Michelle M. Ramim Yair Levy

The growing use of e-learning systems has been documented by numerous studies (Levy, 2005). Yet in spite of this enormous growth, little attention has been given to the issue of security of e-learning systems both in research and in practice. Security of e-learning systems has a unique challenge as these systems are accessed and managed via the Internet by thousands of users over hundreds of ne...

2006
Jabiri Kuwe Bakari Christer Magnusson Charles N. Tarimo Louise Yngström

The overall use and development of ICT in developing countries has been faced with a wide range of constraints and challenges. These constraints may concern culture, infrastructure and education, and involve social, legal, political or economic issues. Numerous problems related to each of these issues have been observed. The problems may include, for example the absence of ICT policies, impleme...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Véronique Cortier Heinrich Hördegen Bogdan Warinschi

Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such models with respect to computational ones, is to explicitly represent the dependency of ciphertexts on random coins as labels. In order to make these label-based models useful, it seems natural to try to extend the und...

Journal: :مطالعات حقوق خصوصی 0
علیرضا پوراسماعیلی استادیار گروه حقوق دانشکدۀ الهیات و معارف اسلامی دانشگاه حکیم سبزواری عبدالحسین شیروی استاد گروه حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران

attracting foreign investment is a technique to achieve economic development, which requires establishment of appropriate legal and administrative infrastructure. in addition, host countries may ignore their public interest and national security. therefore, they have to maintain a balance between economic development and protection of national security. the concern over the national security as...

Journal: :معماری و شهرسازی 0
قاسم مطلبی استادیار دانشکده معماری پردیس هنرهای زیبا، دانشگاه تهران فاطمه خدادادی آق قلعه کارشناسی ارشد معماری، دانشگاه سوره، تهران علی اکبری دانشجوی دکتری معماری، دانشگاه آزاد اسلامی واحد تهران مرکزی، تهران

security is one of the most important human needs. researchers believe that the need for security has a strong and close relationship with the physical characteristics of the environment and people’s satisfaction. to study the relationship between security and environmental (physical and social) satisfaction, ‘’cpted’’ approach and its principals in design and environmental planning and urban l...

Journal: :CoRR 2014
Vladimir A. Khlevnoy Andrey A. Shchurov

Deployment of distributed systems sets high requirements for procedures for the security testing of these systems. This work introduces: (1) a list of typical threats based on standards and actual practices; (2) an extended six-layered model for test generation mission on the basis of technical specifications and end-user requirements. Based on the list of typical threats and the multilayer mod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید