نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

Journal: :international journal of agricultural science, research and technology in extension and education systems 2013
muhammad furqan mirza badar naseem siddiqui muhammad hanif almas jabeen ghazala sadaf

about half of the population in pakistan is food insecure. the study focused the food secure population and the strategies for reducing poverty in district rawalpindi. the study was carried out in district rawalpindi in the punjab province of pakistan. simple random sampling technique was used for this research study in district rawalpindi. a sample of 120 respondents was selected. then the dat...

Journal: :ACM Transactions on Information and System Security 2000

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

Journal: :Advances in Computers 2001
Ross J. Anderson Frank Stajano Jong-Hyeon Lee

A security policy is a high-level specification of the security properties that a given system should possess. It is a means for designers, domain experts and implementers to communicate with each other, and a blueprint that drives a project from design through implementation and validation. We offer a survey of the most significant security policy models in the literature, showing how “securit...

Almas Jabeen Amina Nauman Badar Naseem Siddiqui Ghazala Sadaf Maria Munawwar Muhammad Furqan Mirza Muhammad Hanif Saba Shakeel

About half of the population in Pakistan is food insecure. The study focused the food secure population and the strategies for reducing poverty in district Rawalpindi. The study was carried out in district Rawalpindi in the Punjab province of Pakistan. Simple random sampling technique was used for this research study in district Rawalpindi. A sample of 120 respondents was selected. Then the dat...

Comprehensive Welfare and Social Security System Structure Act, ratified in 2004, brings about a structure, composed of principles, policies, components as well as fundaments within which the substantive laws are regulated and enforced. From such a perspective, it holds a pivotal position to study the relationship between the regulations of Comprehensive Welfare and Social Security System Act a...

2006

This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.

2006

This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.

Journal: :isecure, the isc international journal of information security 0
m. safarzadeh m. taghizadeh b. zamani b. tork ladani

one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید