نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Journal: :Journal of physics 2023

Abstract With the goal of “carbon peaking and carbon neutrality” proposal building a new power system, more research applications wind supporting energy storage have been conducted in scientific technological engineering construction. The management system technology plays key role improving operation efficiency, grid security utilization, reducing cost whole life cycle. This paper sorts out de...

2014
Ramaswamy Chandramouli Michaela Iorga Santosh Chokhani

To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), we identify a set of security capabilities needed to exercise those features an...

Journal: :physiology and pharmacology 0
maryam pourmir guilan university of med sci parvin babaei guilan university of med sci bahram soltani tehrani guilan university of med sci

introduction: kisspeptin-13 (kp-13) is a novel endogenous factor, increases synaptic transmission and is involved in several behavioral functions such as anxiety, locomotion, epilepsy and avoidance learning. however, the role of this peptide on cognition has not been well clarified yet. here we studied the effect of kisspeptin-13 pretreatment on spatial learning and also interaction with cholin...

2006
Syed Naqvi Michel Riguidel

This article presents an overview of our proposed Security Management Model (SMM) for large scale dynamic systems. The goal of the SMM is to offer a simplified view of the overall system by taking into consideration the relevant data for the evaluation of the security assurance. A new thin infrastructure composed of the data/information relevant to the security evaluation of the system and serv...

2012
Anil Mundra Anish Mathuria Manik Lal Das

In the key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Typically, a class requires public and secret information to derive the keys of its descendant classes. There have been many key assignment schemes proposed in recent years that support updates t...

2016
Bibo Jiang Xiulin Hu Feng Zhu Wei Zhu Matt W. Mutka Kenneth Miller E. Michail A. P. Kakarountas A. Milidonis Raul Monroy T. Yu K. E. Seamons A. Hess J. Jacobson R. Jarvis

Multicast routing protocols are widely used as efficient communication methods for Group-oriented applications. Decentralized system is preferred to improve bandwidth economization. However, security with the key management for such protocols re-mains a significant problem. In this paper, a secure group key agreement over decentralized systems is proposed. The proposed system is based on the us...

ژورنال: سلامت کار ایران 2019

Abstract: Background and aims: Performance assessment and also performance indicators have a great importance in all aspects of life. By these indicators appropriate responses to what is happening for make some improvement, could be determined. In the past, the safety and health performance of organizations was measured with using of some indicators from the USA Occupational Health and Safet...

Journal: :JCIT 2010
Xianping Wu Huy Hoang Ngo Phu Dung Le Bala Srinivasan Huamei Qi

This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...

Journal: :IEEE Journal on Selected Areas in Communications 1989
Christopher Mitchell Michael Walker David Rush

This paper examines some aspects of the security services in the CCITT Draft 1988 X.400 Recommendations for Message Handling Systems. A brief introduction to relevant cryptographic concepts is followed by a description of how some of the security services may be provided. Key management, as defined within the CCITT Draft X.500 Recommendations for Directory Services, and as referenced by the X.4...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید