نتایج جستجو برای: especially security needs
تعداد نتایج: 778134 فیلتر نتایج به سال:
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open source domain provides especially SMME’s with options to implement high quality software that are financially viable. Although software costs is a major factor within providing proper working environments, specific secur...
Wireless sensor networks applications are growing and so are their security needs. However, due to severe memory, computing and communication limitations, wireless sensor networks security presents tremendous challenges. Central to any security service, key management is a fundamental cryptographic primitive to provide other security operations. In this paper, we propose IKM, an identity based ...
Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios, especially in the context of inter-organizational cooperation. One of the remaining obstacles for a widespread use of these techniques is security. Companies and organizations open their systems and core business proces...
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or ...
Information plays an important role in today’s businesses. It needs to be protected at all costs in order to avoid facing the consequences of loss of data and compromising information. In order to address information security, SMMEs (Small Medium and Micro Enterprises) should adopt a culture that is security abiding. By supporting a security culture where members of staff intuitively protect in...
Abstract Yemeni crisis has significant consequences on Middle East region and trans-regional security policy. The first symptoms can be associated with different behaviors two regional major player in the region, Iran and Saudi Arabia. So, the main question is what affects the geopolitical identity put foreward on security strategy of Iran and Saudi Arabia in the region and inturn on tha beh...
food security remains a major challenge for most rural households in kenya especially those in arid and semi arid areas. women play a crucial role as primary food producers and custodians of household food security. they however face many constraints in their endeavor to secure food for their households. women, lack access to extension education, land and credit and these challenges are exacerb...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید