نتایج جستجو برای: security level
تعداد نتایج: 1235388 فیلتر نتایج به سال:
this study examined the status and determinants of rural households’ food security in moyale district of pastoral area, oromia regional state, in ethiopia. both secondary and primary data were used for the study. the study was based on the survey of a total of 100 farmers randomly selected using a three-stage sampling technique. analytical tools used include descriptive statistics, foster-greer...
Cloud Computing is used for management of resources applications and information as services over the cloud. The resources used in Cloud are usually distributed as services. Cloud resources are majorly delivered to the customers in terms of services and the security here is implemented through the infrastructure security metrics via a Service Level Agreement (SLA). SLA is a legal framework betw...
Securing information is vital for the survival of many organizations. Therefore, information must be proactively secured against harmful attacks. This securing of information becomes more complex when such information is transmitted over networks. This paper identifies five non-technical pillars (essentials) for network security management. For each pillar a number of specific actions are speci...
the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...
X-Ray is an ionizing electromagnetic radiation with a wide spectrum. A setting where this radiation is widely used is airport security units. This study was conducted to measure the level of momentary exposure to X-Ray in operators and personnel working in security gates of Imam Khomeini airport. In this cross-sectional study, the X-Ray machines used in security gates of Imam Khomeini airport a...
This research is intended to consider the Psychometric characteristics of Feeling Security Scale (TFSS) in Tehran. 3103 Tehrani citizens filled in this form. The Scale validity was checked for its content Validity (referees contingency coefficient) and construct validity (Factor analysis). The results of referee’s contingency coefficient showed that all the obtained coefficients were above 92% ...
This tutorial paper considers the issues of low-level software security from a language-based perspective, with the help of concrete examples. Four examples of low-level software attacks are covered in full detail; these examples are representative of the major types of attacks on C and C++ software that is compiled into machine code. Six examples of practical defenses against those attacks are...
In order to study security systems, we have developed a methodology for application of formal analysis techniques commonly used in communication protocols to the analysis of cryptographic protocols. In particular, we have extended the design and analysis phases of protocol design with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically t...
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce security policies that govern against the misuse of data. Often security policies are not known, too imprecise or simply have been disabled because of changing requirements. Recently several proposals have been made to us...
In this paper we analyze the possibility for malicious agents to transmit an information possibly hidden in a Multi Level Security System via a covert channel. We give a framework for which we get two decidability results. Firstly, given a code and a system one can decide whether the system allows a covert channel for this code. Secondly, one can decide whether there exists a code to transmit o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید