نتایج جستجو برای: multilevel security

تعداد نتایج: 204436  

Journal: :Journal of Physics A: Mathematical and General 2002

Journal: :International Journal of Engineering & Technology 2017

Anatolii Mysyk Ivan Tkach Kateryna Plutytska Serhii Drobotov Svitlana Bondarenko,

The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...

2005
Anestis Vovos Basilis Kladis Nikos Fakotakis

This paper presents a speech operated smart-home control system with a focus on users with special needs – elderly people, people suffering from blindness or low vision and people with mobility impairments. The proposed system simplifies the use of various home appliances by providing a unified speech-controlled interface and thus improves the quality of their everyday life. The paper presents ...

2014
Daniel Mirman

Objectives and Scope Growth curve analysis (multilevel regression) offers a statistical framework for analyzing longitudinal or time course data and for quantifying differences between individuals in the context of a model of the overall group effects. These methods have been known to statisticians for many years (e.g., Wishart, 1938), but they have only recently become a prominent statistical ...

2009
Erdal Cayirci Chunming Rong Wim Huiskamp Cor Verkoelen

Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is in...

2007
Diana L. Hecht Warren A. Rosen

Security is a major cost driver in military systems and is of particular concern when using commercial network protocols in the military environment. MLS systems may be employed to reduce the amount of application software that must be secured and certified at the highest level, avoiding the expense and complexity associated with maintaining the entire system at the highest level of security. T...

2004
Y onglak Sohn Songchun Moon

Trunsuctions are vitu1 .for multi-level secure dutubase munugement systems(MLSh7BMSs) because concurrent e.recution of trunsuctions potentiullv has conflicrs among their uccessing to shured ciutu. Wlea conflict occurs, only one trunsuction i,c. grunted to u c ~ e s s the shared data, olhrr transactions should be delayed until they can sufely use the datu. ‘T7m.w conjlicts may leud to the securi...

2001
Colin Atkinson Thomas Kühne

As the UML attempts to make the transition from a single, albeit extensible, language to a framework for a family of languages, the nature and form of the underlying meta-modeling architecture will assume growing importance. It is generally recognized that without a simple, clean and intuitive theory of how metamodel levels are created and related to one another, the UML 2.0 vision of a coheren...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید