Mobile driving license system deployment model with security enhancement

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

License Negotiation System for Mobile P2p Environment

Due to the swift development of mobile devices, the markets of mobile content business have grown rapidly during the recent years. This development has contributed to a fast introduction of mobile DRM technologies applied to the protection of content against illegal distribution enabled by short range messaging protocols and upcoming mobile peer-to-peer networking. Although the traditional peer...

متن کامل

Security Enhancement for Mobile WiMAX Network

Security in wireless networks has traditionally been considered to be an issue to be addressed at the higher layers of the network.IEEE 802.16, known as WiMAX, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. ...

متن کامل

Security mistakes in information system deployment projects

To secure information systems from malicious attacks have become an increasingly important task in most businesses today. A common way of approaching this problem is to think of securing systems as removing vulnerabilities in them. What defines a vulnerability is however multifaceted. Vulnerabilities are often seen as mistakes made during the development of the system and that have potentially ...

متن کامل

Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach

Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...

متن کامل

OS Security Enhancement System by Considering Security Level

Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical and Applied Cybersecurity

سال: 2020

ISSN: 2708-1397,2664-2913

DOI: 10.20535/tacs.2664-29132020.1.209436