نتایج جستجو برای: internal security

تعداد نتایج: 406278  

Journal: :Inf. & Comput. Security 2017
Temesgen Kitaw Damenu Chris Beaumont

Findings – SSM was particularly useful for exploring the holistic information security issues, enabling models to be constructed which were valuable analytical tools and easily understood by stakeholders, which increased the receptiveness of the bank, and assisted with member validation. Significant risks were apparent from internal sources with weaknesses in aspects of governance and security ...

ژورنال: :پژوهش های حسابداری مالی و حسابرسی 0
بیتا مشایخی دانشیار دانشکده مدیریت دانشگاه تهران ، تهران ، ایران، شادی حسن زاده دانشجوی دکتری دانشگاه تهران، تهران ، ایران. یاسین امینی دانشجوی دکتری دانشگاه تهران، تهران ، ایران. وحید منتی دانشجوی دکتری دانشگاه تهران، تهران ، ایران.

هدف این مطالعه بررسی تاثیر دو جنبه کیفیت حسابرسی داخلی یعنی صلاحیت و همکاری حسابرس داخلی در حسابرسی صورتهای مالی است. مطابق تئوری جانشینی حسابرس مستقل با اتکا به نتایج کار حسابرس داخلی در تلاش های خود صرفه جویی می کند که این امر بر حق الزحمه حسابرس مستقل تاثیر خواهد گذاشت. دو ویژگی کیفی حسابرسی داخلی (صلاحیت و همکاری) منجر به حمایت از دیدگاه جانشینی برای توضیح رابطه بین کیفیت حسابرسی داخلی و حق...

Journal: :Computers & Security 2012
Timothy H. Lacey Robert F. Mills Barry E. Mullins Richard A. Raines Mark E. Oxley Steven K. Rogers

This paper examines the theory, application, and results for a Reputation-Based Internet Protocol Security (RIPsec) framework that provides security for a Mobile Ad-hoc Network (MANET) operating in a hostile environment. While there has been significant research in MANET security, the research has tended to address subsets of the overall security challenge. RIPsec leverages existing technologie...

Journal: :The Journal of nutrition 2014
Nadine R Sahyoun Mark Nord Anniebelle J Sassine Karin Seyfert Nahla Hwalla Hala Ghattas

The objective of this article was to describe 1) the validation of 2 similar but not identical food security modules used to collect data from 2 vulnerable populations, southern Lebanon residents (n = 815) and Palestinian refugees in Lebanon (n = 2501), and 2) the development and validation of an Arab Family Food Security Scale (AFFSS). The surveys used a cluster-randomized sampling design. The...

2013
Muhammad Ahmed Xu Huang Hongyan Cui

Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms are essential. Malicious or internal attacker has gained attention as the most chal...

2016
Dengpan Wu

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization ...

2011
Rikke Bendlin Jesper Buus Nielsen Peter Sebastian Nordholt Claudio Orlandi

A deniable cryptosystem allows a sender and a receiver to communicate over an insecure channel in such a way that the communication is still secure even if the adversary can threaten the parties into revealing their internal states after the execution of the protocol. This is done by allowing the parties to change their internal state to make it look like a given ciphertext decrypts to a messag...

Journal: :EURASIP J. Wireless Comm. and Networking 2012
Hui Lin Jianfeng Ma Jia Hu Kai Yang

Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem. Security and privacy issues are of paramount importance to WMNs for their wide deployment and for supporting service-oriented applications. Moreover, to support real-time services, WMNs must also be equipped with secure, re...

2000
AS AN Bryan T. Koch

Even in the most secure organizations, information security threats and vulnerabilities are increasing over time. Vulnerabilities are increasing with the complexity of internal infrastructures; complex structures have more single points of failure, and this in turn increases the risk of multiple simultaneous failures. Organizations are adopting new, untried, and partially tested products at eve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید