نتایج جستجو برای: security concerns

تعداد نتایج: 280401  

Journal: :JTHTL 2011
Andreas S. V. Wokutch

INTRODUCTION ................................................................................... 532 I. OVERVIEW OF SMART GRID DEVELOPMENT ....................... 533 II. WHY NUSP-CONSUMER INTERACTIONS SHOULD BE REGULATED .............................................................................. 534 A. What are NUSPs and How Do They Interact with Consumers? ....................................

Journal: :IJALR 2014
Greg Gogolin Erin Gogolin Hwee-Joo Kam

The use of virtual worlds and social media has grown to the point that more than one-quarter of the world’s population utilize it in some manner. Security and privacy concerns regarding the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, virtual worlds and Web 3.0 is examined. Security and privacy concerns are investigated in the...

Journal: :International Journal of Software Engineering and Knowledge Engineering 2007
Haralambos Mouratidis Paolo Giorgini

Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing s...

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

Journal: :مطالعات راهبردی سیاستگذاری عمومی 0
نسا زاهدی استادیار مطالعات منطقه ای دانشگاه مفید سعید امینی کارشناس ارشد مطالعات خاورمیانه و شمال آفریقا

security issues are the main concerns for players in international relations, for they put them on guard against potential relations that might cause threats. security feeling or lack of it determines the modality of cooperation and alliance among regional and trans-regional countries. the european :union: is vulnerable to threats and crises arising in the neighboring middle east. this state of...

2005
Radoslaw Adamus Kazimierz Subieta

The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented as virtual object-oriented updatable views. The code of an aspect related to particular objects is encapsulated within a separate view that overrides all generic operations performed on the objects. Aspect tiers form...

2004
Li Yang Raimund K. Ege Huiqun Yu

Research on mediation techniques to integrate data from heterogeneous data sources has made comprehensive progress. However, mediation poses extensive security problems. Protecting proprietary data from unauthorized access is recognized as one of the most significant barriers to the mediation systems. Neither traditional access control methods are adequate to model the flexible access control r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید