نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

2005
Stefan Lindskog Erland Jonsson

In a Quality of Service (QoS) aware communication system, a user is able to choose between various service classes, each with different reliability, predictability, and efficiency degrees. However, until now security has not been recognized as a parameter in QoS architectures and no security-related service classes have been defined. This implies that end-users have no chance of configuring the...

2013
Yulia Cherdantseva Jeremy Hilton

Information Assurance & Security (IAS) is a dynamic domain which changes continuously in response to the evolution of society, business needs and technology. This paper proposes a Reference Model of Information Assurance & Security (RMIAS), which endeavours to address the recent trends in the IAS evolution, namely diversification and deperimetrisation. The model incorporates four dimensions: In...

2010
DeShu Lin TingLei Huang

Increasingly widespread application of mobile agent, mobile agent system’s security is a prominent problem to be solved, mobile agent’s security question is critical. In this paper, based on cryptography, computer network security, mobile agent security architecture at the same time gives the practical methods and suggested ways can be used in other new security measures. The core problem is ho...

Journal: :CoRR 2018
Payman Behnam

With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...

2014
Mohamed Ibrahim Mohamed Shanavas

Web Services has emerged as a dominant paradigm for constructing and composing distributed business collaborations over the web. Security is one of the major concerns when developing mission critical business applications and this concern motivates Web Services Security specifications. This paper provides the literature review on the construction of solutions to SOA attacks on SOAP based web se...

2000
Madalina Baltatu Antonio Lioy

This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned, the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally, common IPsec applications are presented and the fu...

Background and Objectives: This study was undertaken to determine the relationship between food security and individual dietary diversity score (IDDS). Materials and Methods: This population-based cross-sectional study was conducted on 200 non-diabetic individuals aged ≥40 years, selected randomly from the Tehran Lipid and Glucose Study. Household food security was measured using a validated U...

Journal: :محیط شناسی 0
عباس مصلّی نژاد

security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...

ژورنال: مطالعات تفسیری 2014
Ansari, M'asumeh , Tajari, Aliasghar,

Need is the inseparable component of social life. Therefore, human societies are always encountered by needs in such fields as food, clothes and house. Meanwhile, some of the needs such as security, having basic and fundamental dimensions, sometimes stay away from the minds. Significance and position of security is so important that its absence makes it impossible for human being to enjoy other...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید