نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Since pension funds are among the most important and effective organizations in economic and social environments, it is critical to study their problems ahead. Asset and liability management (ALM) is a useful tool to study pension funds and their stakeholders. This paper tries to understand the key factors effecting on ALM and to analyze them using system dynamics. Fuzzy inference engine is als...

Journal: :International journal of engineering. Transactions B: Applications 2022

Many factors play a role in the life cycle of construction industry projects, focusing on human resources and relationships as main axis business development. Thus, conflict interests between stakeholders projects is clear challenging problem. The increased number project complicates and, consequently, increases possible conflicts. conflicts may result claims if not resolved. success their cost...

Journal: :Socioeconomic challenges 2023

This article summarizes the arguments and counterarguments within scientific debate on issue of waste management system as a key determinant green development transformation energy balance. The main goal research is to analyze structure production its impact environment in context development, taking into account current realities war Ukraine. systematization literary sources approaches solving...

Journal: :Journal of Systems Architecture - Embedded Systems Design 2009
Jose M. Alcaraz Calero Gabriel López Millán Gregorio Martínez Pérez Antonio F. Gómez-Skarmeta

Nowadays, there exists certain important scenarios where different WS-* security related protocols and technologies are being used, such as e-commerce, resource control, or secure access to grid nodes. Additionally, most of these scenarios require the interaction with a trust management infrastructure (such as a PKI -Public Key Infrastructure-), usually to validate the digital certificates prov...

The purpose of this study was to identify the key factors in implementing the organization's resource planning system in Chaharmahal and Bakhtiari Saderat Bank using theme analysis method. This research was a type of qualitative research that was done in an applied way. The research population consists of 15 experts and specialist in system implementation, resource planning in Chaharmahal and B...

2005
Steven M. Bellovin Russell Housley

The question often arises of whether or not a given security system requires some form of automated key management, or whether manual keying is sufficient. This memo proposes guidelines for making such decisions. The presumption is that when symmetric cryptographic mechanisms are used in a protocol, then automated key management is generally but not always needed. If manual keying is proposed, ...

Journal: :I. J. Network Security 2016
Rang Zhou Chunxiang Xu Wanpeng Li Jining Zhao

Many ways are proposed to reduce the secret storage space of access control in hierarchy, but no one optimizes the public parameters which are only modified by CA. Length of each public parameter is one important factor for the size and utilization of storage space. The frequent changes on the maximum length of public parameter will be a weakness for stability, in dynamic key management. Number...

Journal: :پژوهش های روستایی 0
ارسطو یاری حصار عضو هیات علمی گروه جغرافیا دانشگاه محقق اردبیلی محمدحسین بوچانی کارشناسی ارشد برنامه ریزی شهری دانشگاه شهید بهشتی داوود مهدوی عضو هیات علمی دانشگاه پیام نور واحد شهرکرد مجید پریشان عضو هیات علمی دانشگاه پیام نور واحد شاهین دژ

introduction: nowadays the issue of management is deeply important because of limited facilities and unlimited humans needs. in other word, having a developed society involves application of a systematic and powerful management system. management is a practice of utilizing all available resources to obtain the defined goals. rural development management can be defined as the activity and proces...

Journal: :JCIT 2010
Huy Hoang Ngo Xianping Wu Phu Dung Le Bala Srinivasan

Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization,...

2003
Feng Zhu Agnes Chan Guevara Noubir

As applications of secure multicast in networks continue to grow, the demand for an efficient scheme to manage group keys for secure group communication becomes more urgent. In this paper, we propose a new key tree structure for group key management. With this optimal tree structure, system resources such as network bandwidth can be saved. We devise an algorithm to generate this optimal tree an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید