نتایج جستجو برای: the musharakah certificates

تعداد نتایج: 16053180  

Journal: :Journal of the Korean Medical Association 2014

Journal: :International Journal of Health Sciences (IJHS) 2022

All certificates, including those for secondary school graduation, high diplomas, and college degrees, have been converted to digital form made accessible students at higher education institutions. It's essential learners keep track of their diplomas. It is a complex time-consuming process the institution or organization verify authenticate certificate's validity. This application would aid in ...

2008
John Gilbert Russell Perry

X.509 Proxy Certificates have been proposed for use in the Grid Security Infrastructure to allow dynamic delegation of rights and single sign-on for end users. We have evaluated proxy certificates to secure a service-oriented architecture for digital content based on Web Services. We describe how support for proxy certificates was implemented in Java through extensions to the Java Cryptography ...

Journal: :مدیریت اطلاعات سلامت 0

introduction: obeying patient rights is dependent upon the knowledge of healthcare providers about ethical and legal aspects of healthcare. this study aimed to determine the knowledge of physicians, nurses and medical record personnel about legal aspects of medical records in teaching hospitals affiliated to kashan university of medical sciences. methods: in this cross-sectional study, 325 heal...

2013
Ahmed Suleman Haque Kanza Shamim Najm Hasan Siddiqui Muhammad Irfan Javaid Ahmed Khan

BACKGROUND Death certificates (DC) can provide valuable health status data regarding disease incidence, prevalence and mortality in a community. It can guide local health policy and help in setting priorities. Incomplete and inaccurate DC data, on the other hand, can significantly impair the precision of a national health information database. In this study we evaluated the accuracy of death ce...

2013
A. Langley E. Kasper

This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to hon...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید