نتایج جستجو برای: security model

تعداد نتایج: 2246841  

A. H. Adenuga F. L. Olagunju O. M. Adenuga R. O. Babatunde

This study was carried out to evaluate the Ekiti State Social Security Scheme (ESSSS) in Nigeria. Specifically, the study estimated the food security status of the beneficiaries and non beneficiaries of the scheme, assessed the effect of the social security scheme on households’ food security status, and identified the constraints to the implementation of the scheme in the state. A three stage ...

Journal: :isecure, the isc international journal of information security 0
a. sedaghatbaf school of computer engineering, iran university of science and technology, tehran, iran m. abdollahi azgomi school of computer engineering, iran university of science and technology, tehran, iran

quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. however, an important question arises with respect to the accuracy of input parameters. in practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

Journal: :international journal of information, security and systems management 2012
alireza pour ebrahimi payvand fartash naini

a culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ism. this study aims to ...

ژورنال: مجله طب نظامی 2020

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

Journal: :مدیریت فناوری اطلاعات 0
پریسا موسوی کارشناس‎ارشد مدیریت فناوری اطلاعات، دانشکدۀ مدیریت و حسابداری، دانشگاه خوارزمی، تهران، ایران رضا یوسفی زنوز استادیار گروه مدیریت، دانشکدۀ مدیریت و حسابداری، دانشگاه خوارزمی، تهران، ایران اکبر حسن پور استادیار گروه مدیریت، دانشکدۀ مدیریت و حسابداری، دانشگاه خوارزمی، تهران، ایران

most organizations need to information systems to survive and thrive. therefore, they should seriously protect their information assets. creating structured and justifiable exchanges between cost, security and mission control systems security risks is essential. this is important in the planning and development of such systems. initial appropriate decisions can reduce costs and increase ease of...

Although injuries and abnormalities are somewhat normal in all societies, human nature is always subject to many shortcomings and differences, but in some cases these differences can be sufficient to cause insecurity in societies. The present study seeks to examine the social factors affecting the sense of security. Various factors affect the sense of security that their identification requires...

Journal: :تحقیقات اقتصادی 0
حسین سجادی دانشیار گروه حسابداری دانشگاه شهید چمران حسن فرازمند استادیار گروه اقتصاد دانشگاه شهید چمران اهواز بهروز بادپا کارشناس ارشد حسابداری

the purpose of this research is investigation of application of the arbitrage pricing theory and effect of unanticipated changes in a set of macroeconomic variables such as inflation rate, money supply, exchange rate, oil price, term structure and industrial production on expected security return in tehran stock exchange. in this research, data are analyzed quarterly for the period of 1997-2008...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

M. Pourpouneh, R. Ramezanian

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

Journal: :Information & Software Technology 2015
Phu Hong Nguyen Max E. Kramer Jacques Klein Yves Le Traon

Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research onMDS has resulted in a large number

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید