نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
The actor network procedures of Pavlovic and Meadows are a recent graphical formalism developed for describing security ceremonies and for reasoning about their security properties. The present work studies the relations of the actor network procedures (ANP) to the recent psi-calculi framework. Psi-calculi is a parametric formalism where calculi like spior applied-pi are found as instances. Psi...
In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organisations appear to have understood the necessity for computer security, especially data security. Currently, in most organisations, security officers focus on IT securi...
This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned, the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally, common IPsec applications are presented and the fu...
this research study aimed to investigate the relationship between field-dependence/independence cognitive style and vocabulary learning strategies among iranian efl learners. ninety participants majoring in english translation at arak university were chosen. the participants were classified into two groups of field-dependent and independent based on the results of group embedded figure test (ge...
The security of information is important to protect top secret documents for government and private organisations alike. For this reason, many methods have been developed to enforce security and protect access to documents, computers and networks. Some of these methods include policies and procedures. These policies and procedures are compiled according to an Information Security Architecture (...
Received: 8 April 2008 Revised: 15 August 2008 2nd Revision: 18 January 2009 Accepted: 23 February 2009 Abstract Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies a...
methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...
the research discussed in this article consists of the process ended to propos a structure for social welfare and security which took more than 11 months in social security research institute. the main topics discussed are as follows: 1- the importance of social security and its relationship to economic growth, social justice, human generosity and national honor. 2- the basis and opportunities ...
In recent decades, biotechnologists have striven to improve the quantity and quality of food supply. Producing genetically modified (GM) foods is one of the main goals and many countries all over the world have approved the distribution and consumption of the labeled GM foods in their own regions. However, there are still few groups having concerns about allergenicity of GM foods. This review h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید