نتایج جستجو برای: knowledge storage and security

تعداد نتایج: 16904841  

2006
Syed Naqvi Philippe Massonet Álvaro Enrique Arenas

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their shortcomings that should be addressed in our work. We identify a comprehensive set of security requirements for GDMS followed by the presentation of our proposed Security Requirements M...

Journal: :تحقیقات اقتصاد و توسعه کشاورزی ایران 0
کبری شبانی کارشناس ارشد، دانشگاه رامین خوزستان محمدرضا شاه پسند استادیار مؤسسة آموزشی عالی علمی کاربردی وزارت جهاد کشاورزی مسعود برادران دانشیار دانشکدة کشاورزی، دانشگاه رامین خوزستان بهمن خسروی پور استادیار دانشکدة کشاورزی، دانشگاه رامین خوزستان نوشین زندی سوهانی استادیار دانشکدة کشاورزی، دانشگاه رامین خوزستان

the purpose of this study is identify the most distinguishing factors of farmers' attitudes and behaviors regarding food security. the research method was survey and correlational research. the population was 25435 farmers of shush, shooshtar and dezful district. 379 farmers were selected based on the table of takman and morgan. finally, 237 questionnaires were collected. data collection w...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

Journal: :international journal of information science and management 0
prof. dr. m. e. mohammadpourzarandi central branch of azad university, tehran, iran r. tamimi north tehran branch of azad university, iran

nowadays, world wide web has become a popular medium to search information, business, trading and so on. various organizations and companies are also employing the web in order to introduce their products or services around the world. therefore e-commerce or electronic commerce is formed. e-commerce is any type of business or commercial transaction that involves the transfer of information acro...

Journal: :JNW 2013
Yan Guang Yuefei Zhu Chunxiang Gu Yonghui Zheng Jin-long Fei

Proof of retrievability (POR) is an interactive knowledge proof technique for a storage server to prove the integrity and ownership of clients’ data without downloading them. In this paper we consider efficiency of the POR scheme, when the data stored in cloud is encrypted under fully homomorphic encryption schemes. We presented a POR scheme with new, efficient homomorphic authenticator, which ...

2013
Junghee Lee Chrysostomos Nicopoulos Gi-Hwan Oh Sang-Won Lee Jongman Kim

Malware detectors and integrity checkers detect malicious activities by comparing against reference data. To ensure their trustworthy operation, it is crucial to protect the reference data from unauthorized modification. This paper proposes the Soteria Security Card (SSC), an append-only storage. To the best of our knowledge, this work is the first to introduce the concept of an append-only sto...

2014
chun-ting huang lei huang zhongyuan qin hang yuan lan zhou vijay varadharajan jay kuo

Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in associa...

Fahimnia, Fatima, Heydari, Gholam Reza , Shekari, Mohammadreza,

Background and Aim: The aim of this study is to assess the Iranian Personal electronic information management of knowledge and information science and medical Library and Information Sciences faculty members based on the Jones model. Method: This study is kind of application research and in terms of data collection is descriptive and analytical study. The statistical population included faculty...

2008
Ryan Goss Johan van Niekerk

The greatest threat to Information Security are the employees within an organization. Many security controls rely on the user in order to be effective. It is thus vital to educate users about their role(s) in security. Many companies cannot afford, in terms of time or finances, to replace employees during training periods. The Web has long since been identified as a viable alternative to tradit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید