نتایج جستجو برای: multilevel security
تعداد نتایج: 204436 فیلتر نتایج به سال:
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
This paper presents a speech operated smart-home control system with a focus on users with special needs – elderly people, people suffering from blindness or low vision and people with mobility impairments. The proposed system simplifies the use of various home appliances by providing a unified speech-controlled interface and thus improves the quality of their everyday life. The paper presents ...
Objectives and Scope Growth curve analysis (multilevel regression) offers a statistical framework for analyzing longitudinal or time course data and for quantifying differences between individuals in the context of a model of the overall group effects. These methods have been known to statisticians for many years (e.g., Wishart, 1938), but they have only recently become a prominent statistical ...
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is in...
Security is a major cost driver in military systems and is of particular concern when using commercial network protocols in the military environment. MLS systems may be employed to reduce the amount of application software that must be secured and certified at the highest level, avoiding the expense and complexity associated with maintaining the entire system at the highest level of security. T...
Trunsuctions are vitu1 .for multi-level secure dutubase munugement systems(MLSh7BMSs) because concurrent e.recution of trunsuctions potentiullv has conflicrs among their uccessing to shured ciutu. Wlea conflict occurs, only one trunsuction i,c. grunted to u c ~ e s s the shared data, olhrr transactions should be delayed until they can sufely use the datu. ‘T7m.w conjlicts may leud to the securi...
As the UML attempts to make the transition from a single, albeit extensible, language to a framework for a family of languages, the nature and form of the underlying meta-modeling architecture will assume growing importance. It is generally recognized that without a simple, clean and intuitive theory of how metamodel levels are created and related to one another, the UML 2.0 vision of a coheren...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید