نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
Abstract With the goal of “carbon peaking and carbon neutrality” proposal building a new power system, more research applications wind supporting energy storage have been conducted in scientific technological engineering construction. The management system technology plays key role improving operation efficiency, grid security utilization, reducing cost whole life cycle. This paper sorts out de...
To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), we identify a set of security capabilities needed to exercise those features an...
introduction: kisspeptin-13 (kp-13) is a novel endogenous factor, increases synaptic transmission and is involved in several behavioral functions such as anxiety, locomotion, epilepsy and avoidance learning. however, the role of this peptide on cognition has not been well clarified yet. here we studied the effect of kisspeptin-13 pretreatment on spatial learning and also interaction with cholin...
This article presents an overview of our proposed Security Management Model (SMM) for large scale dynamic systems. The goal of the SMM is to offer a simplified view of the overall system by taking into consideration the relevant data for the evaluation of the security assurance. A new thin infrastructure composed of the data/information relevant to the security evaluation of the system and serv...
In the key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Typically, a class requires public and secret information to derive the keys of its descendant classes. There have been many key assignment schemes proposed in recent years that support updates t...
Multicast routing protocols are widely used as efficient communication methods for Group-oriented applications. Decentralized system is preferred to improve bandwidth economization. However, security with the key management for such protocols re-mains a significant problem. In this paper, a secure group key agreement over decentralized systems is proposed. The proposed system is based on the us...
Abstract: Background and aims: Performance assessment and also performance indicators have a great importance in all aspects of life. By these indicators appropriate responses to what is happening for make some improvement, could be determined. In the past, the safety and health performance of organizations was measured with using of some indicators from the USA Occupational Health and Safet...
This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...
This paper examines some aspects of the security services in the CCITT Draft 1988 X.400 Recommendations for Message Handling Systems. A brief introduction to relevant cryptographic concepts is followed by a description of how some of the security services may be provided. Key management, as defined within the CCITT Draft X.500 Recommendations for Directory Services, and as referenced by the X.4...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید