نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2002

The research on the effects of study is hindered by the limitations of the techniques and methods of registering, measuring and assessing the actually formed knowledge. The problem has been solved using latent semantic analysis for comparison and assessment of scientific texts and knowledge, expressed in the form of free verbal statements. Education at higher schools has the specific objective ...

Journal: :مجله سازمان نظام پزشکی جمهوری اسلامی ایران 0

introduction: this research is planning to observe the influence of sense of social security on doctors’ social health in tehran. therefore, it seems that there is a meaningful relationship among doctors’ social health as a dependent variable, and sense of social security of doctors as the main independent variable. also, piety, life satisfaction, social morality and assessing by others as the ...

2001

This briefing is part of the World Bank’s Pension Reform Primer: a comprehensive, up-to-date resource for people designing and implementing pension reforms around the world. For more information, please contact Social Protection, Human Development Network, World Bank, 1818 H Street NW, Washington, D.C. 20433; telephone +1 202 458 5267; fax +1 202 614 0471; e-mail [email protected]....

2007
MICHAEL S. GIBSON

E C O N O M I C R E V I E W Fourth Quarter 2007 The growth of credit derivatives suggests that market participants find them useful for risk management. Figure 1 shows the growth trajectory for credit derivatives from two surveys of derivatives dealers: the International Swaps and Derivatives Association (ISDA) Market Survey, which goes back to 2001, and the Bank for International Settlements (...

2006
William H. King Robert F. Mills Michael R. Grimaila

Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization’s malicio...

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

2014
Alegria Baquero Richard N. Taylor

The exchange of electronic health records (EHR) among multiple parties and for multiple purposes raises nontrivial concerns. Unfortunately, privacy and operational policies granting individual access privileges to parties are often artifacts foreign to healthcare systems, thus EHR security is all the more frail. Moreover, current web service technologies that constitute many EHR systems treat u...

2015
Pooja Dubey

During the transmission of data from sender prevents from various attacks. Public key encryption is a technique which provides encryption of data using public key. The existing technique implemented for the searching of keywords with public key encryption provides security from password Guessing attacks [1]. But the technique implemented here enables security from various attacks as fine as als...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید