نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

Journal: :Advances in Applied Mathematics 2017

2005
Tim Schattkowsky

Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocols in IP-based networks. Applications in such networks should transparently overcome these limitations. Examples for such applications range from simple chat clients to collaborative work environments spanning differen...

2004
Nut Taesombut Andrew A. Chien

Distributed Virtual Computer (DVC) is a computing environment which simplifies the development and execution of distributed applications on computational grids. DVC provides a simple set of abstractions to simplify application management of naming, security, communication, and resource, easing use of highly dynamic and heterogeneous resource environments. These abstractions enable complex colle...

2006
Tao Xie Xiao Qin

High quality of security is increasingly critical for applications running on heterogeneous distributed systems, where processors operate at different speeds and communication channels have different bandwidths. Although there are a few scheduling algorithms in the literature for heterogeneous distributed systems, they generally do not take into account of security requirements of applications....

2013
Lalitha Kumari

In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according to its goals, requirements and objecti...

2017
Enrico Schiavone Andrea Ceccarelli Andrea Bondavalli

Distributed internet services involve multiple heterogeneous applications that communicate with each other. Guaranteeing their security is in general both mandatory and complex. Amongst the many security requirements that have to be guaranteed, secure user authentication is one of the most fundamental. Authentication is traditionally executed only at login phase, based on username and password....

2006
Bijaya Karki Vamsi Paruchuri

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

2006
Vinaykumar Muralidharan Weichao Wang Alexander Wyglinski

Security is a concern in the next generation Hybrid networks. This paper analyzes the various architectures that are proposed for next generation networks. Then we analyze their performance towards defending themselves from various malicious attacks and how the malicious nodes can exploit the differences in nature of the network to perform attacks. The solution to these attacks are provided by ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید