نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
Since pension funds are among the most important and effective organizations in economic and social environments, it is critical to study their problems ahead. Asset and liability management (ALM) is a useful tool to study pension funds and their stakeholders. This paper tries to understand the key factors effecting on ALM and to analyze them using system dynamics. Fuzzy inference engine is als...
Decision Support System for Analyzing Key Performance Indicators in Construction Projects Management
Many factors play a role in the life cycle of construction industry projects, focusing on human resources and relationships as main axis business development. Thus, conflict interests between stakeholders projects is clear challenging problem. The increased number project complicates and, consequently, increases possible conflicts. conflicts may result claims if not resolved. success their cost...
This article summarizes the arguments and counterarguments within scientific debate on issue of waste management system as a key determinant green development transformation energy balance. The main goal research is to analyze structure production its impact environment in context development, taking into account current realities war Ukraine. systematization literary sources approaches solving...
Nowadays, there exists certain important scenarios where different WS-* security related protocols and technologies are being used, such as e-commerce, resource control, or secure access to grid nodes. Additionally, most of these scenarios require the interaction with a trust management infrastructure (such as a PKI -Public Key Infrastructure-), usually to validate the digital certificates prov...
The purpose of this study was to identify the key factors in implementing the organization's resource planning system in Chaharmahal and Bakhtiari Saderat Bank using theme analysis method. This research was a type of qualitative research that was done in an applied way. The research population consists of 15 experts and specialist in system implementation, resource planning in Chaharmahal and B...
The question often arises of whether or not a given security system requires some form of automated key management, or whether manual keying is sufficient. This memo proposes guidelines for making such decisions. The presumption is that when symmetric cryptographic mechanisms are used in a protocol, then automated key management is generally but not always needed. If manual keying is proposed, ...
Many ways are proposed to reduce the secret storage space of access control in hierarchy, but no one optimizes the public parameters which are only modified by CA. Length of each public parameter is one important factor for the size and utilization of storage space. The frequent changes on the maximum length of public parameter will be a weakness for stability, in dynamic key management. Number...
introduction: nowadays the issue of management is deeply important because of limited facilities and unlimited humans needs. in other word, having a developed society involves application of a systematic and powerful management system. management is a practice of utilizing all available resources to obtain the defined goals. rural development management can be defined as the activity and proces...
Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization,...
As applications of secure multicast in networks continue to grow, the demand for an efficient scheme to manage group keys for secure group communication becomes more urgent. In this paper, we propose a new key tree structure for group key management. With this optimal tree structure, system resources such as network bandwidth can be saved. We devise an algorithm to generate this optimal tree an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید