نتایج جستجو برای: database outsourcing

تعداد نتایج: 275059  

2014
Wei Wei Ting Yu

Database outsourcing has become increasingly popular as a cost-effective solution to provide database services to clients. Previous work proposed different approaches to ensuring data integrity, one of the most important security concerns in database outsourcing. However, to the best of our knowledge, existing approaches require modification of DBMSs to facilitate data authentication, which gre...

Background and Aim: Today, with the growth of government services and the increase in the workload of organizations due to population growth and increasing the number of citizens receiving services and the lack of government resources in providing manpower as well as the purchase of facilities and machinery The need has led executives to outsource services. Outsourcing is usually used as a way ...

Journal: :Djtechno 2022

PT. Narendra Dewa Yoga adalah badan usaha yang terletak di Kota Bengkulu dan bergerak bidang jasa outsourcing. Setiap tahunnya dilakukan pembukaan lowongan untuk bekerja sebagai karyawan outsourcing, proses seleksi dengan melihat umur, nilai diperoleh, serta hasil wawancara. Jika layak maka calon tersebut diterima. Namun semua masih belum rancanga menggunakan aplikasi hanya tersedia melalui for...

Journal: :مدیریت زنجیره تأمین 0
حجت الله حمیدی عماد روغنیان علی کمانکش

today, the benefits of organizations cannot be achieved by one organization alone, because the organizations are trying to make their business focus on core competence, and they outsourcing other activities to other organizations. iranian organizations have long spoken of it outsourcing is a form of serious issues; so managers need to increase their knowledge and techniques in the field of it o...

Journal: :مدیریت توسعه و تحول 0
محمدرضا مهرگان دانشیار دانشکده مدیریت، دانشگاه تهران هادی سلامی دانش آموخته کارشناسی ارشد مدیریت صنعتی دانشگاه تهران (عضو باشگاه پژوهشگران جوان دانشگاه آزاد اسلامی) مصطفی خواجه دانشگاه آزاد اسلامی،واحد قم،گروه مدیریت صنعتی، ایران،قم.(عهده دار مکاتبات

currently, outsourcing is recognized as one of the useful strategies in the world of business. in this respect, business processes outsourcing is one of the most common forms of outsourcing. the purpose of the present study is to provide a multi attribute decision making model in order to outsource the process of azin-tane company. to this end, 19 effective attributes were driven after doing in...

2015
Qian Wang Shengshan Hu Kui Ren Meiqi He Minxin Du Zhibo Wang

Biometric identification has been incredibly useful in the law enforcement to authenticate an individual’s identity and/or to figure out who someone is, typically by scanning a database of records for a close enough match. In this work, we investigate the privacy-preserving biometric identification outsourcing problem, where the database owner outsources both the large-scale encrypted database ...

2005
Amril Syalim Toshihiro Tabata Kouichi Sakurai

There are many situations where users of databases cannot fully trust the administrators of databases where they store their data. In this paper we propose a partially outsourced access control model for such databases. In this model, access control to databases is partially outsourced to third parties. The tasks of the third parties are: partially mediates access control to databases and parti...

تقی‌زاده, هوشنگ, صادقی باروجی, زین‌العابدین,

In this paper, the outsourcing management in Tabriz Oil Refining Co. has been examined. In this regard, after reviewing the literature, the factors for evaluation of outsourcing management situation were identified, and the research hypotheses were stated. The statistical population of the research includes all the managers and personnel employed in the outsourcing department of Tabriz Oil Refi...

2008
Sergej Evdokimov

This thesis considers the possibilities of secure outsourcing of databases and of content-based routing operations to an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions of the thesis are the following: We e...

2008
Timothy Sturgeon Johannes Van Biesebroeck Gary Gereffi

In this paper we apply global value chain (GVC) analysis to recent trends in the global automotive industry, with special attention paid to the case of North America. We use the three main elements of the GVC framework — firm-level chain governance, power, and institutions — to highlight some of the defining characteristics of this important industry. First, national political institutions crea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید