منابع مشابه
Protecting Security Information in Distributed Systems
The paper shows how Security Iqformatwn for user aulhenticatwn, peer-entity authentication and access control is created and w“lised in large distributed systems. The protectwn mechanisms used are hashfwctions, symmetric and asymmetric cryptography. We describeand combine data formats for Secura”tyInjormatwn based on international standardsfrom several stawi-wdisatwn bodies.
متن کاملExploring the Roles of Agricultural Extension in Promoting Food Security in Kwazulu-Natal Province, South Africa
Household food security remains a challenge in South Africa. The national government instituted the Integrated Food Security Strategy (IFSS) programme which identifies household agricultural production as an important element of improving household-level food security. Agricultural extension is well positioned to help achieve this aim, but its current contribution is unknown. This study identif...
متن کاملProtecting patient privacy and data security.
n engl j med 368;11 nejm.org march 14, 2013 977 about a celebrity patient who had been admitted for pregnancy complications. A nurse, filling in at the reception desk in the early morning hours, answered the phone and, without attempting to verify the callers’ identities, transferred them to the duty nurse caring for the Duchess of Cambridge. The duty nurse then provided them with confidential ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Constitutional Law
سال: 2013
ISSN: 1474-2640,1474-2659
DOI: 10.1093/icon/mos060