نتایج جستجو برای: security as a service

تعداد نتایج: 14071652  

2015
Shenja van der Graaf Wim Vanobberghen Michalis Kanakakis Costas Kalogiros

This paper aims to unravel the intricacies of the mechanisms of trust vis-à-vis ICTs and the contextual logic guiding user deployment and experience, necessitating a view of trust in the digital realm as a dynamic process. Trust models tend to highlight ‘well-placed trust’ in their focus on drawing out (sub)components of (perceived) trustworthiness as attributes of the trusted system or party f...

2009
Aman Y.M. Chan Vincent Cho

With the further improvement in internet bandwidth, connection stability and data transmission security, a new wave of Application Service Providers (ASP) is on his way. The recent booming on some models such as Software Application as Service (SaaS) and On-Demand in 2008, has led to emergence of ASP model in core business functions. The traditional IS outsourcing covers the non-core business f...

2014
B. O. Lawal

Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers’ Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concern...

Abdu-Raheem Kamal Adekunle

Household food security remains a challenge in South Africa. The national government instituted the Integrated Food Security Strategy (IFSS) programme which identifies household agricultural production as an important element of improving household-level food security. Agricultural extension is well positioned to help achieve this aim, but its current contribution is unknown. This study identif...

2015
S. Monikandan

Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs) by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be ...

VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...

Journal: :caspian journal of internal medicine 0
alireza heidarian management of social security in mazandaran, ghaemshahr, iran seyed ebrahim jafari-kelarijani management of social security in mazandaran, ghaemshahr, iran reza jamshidi management of social security in mazandaran, ghaemshahr, iran mohammad khorshidi management of social security in mazandaran, ghaemshahr, iran

background: health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. the purpose of this study was to determine the factors affecting this motivation. methods: from winter 2013 to spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were ...

VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1392

abstract the present study deals with a comparison between reactive and pre-emptive focus-on-form in terms of application and efficiency. it was conducted in an intermediate english class in shahroud. 15 male learners participated in this research and their age ranged from 18 to 25. a course book, new interchange 3, and a complementary book were used. every session the learners gave lectures o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید