نتایج جستجو برای: security issues in summary process
تعداد نتایج: 17146815 فیلتر نتایج به سال:
Background Healthcare stakeholders have a great interest in the adoption and use of electronic personal health records (ePHRs) because of the potential benefits associated with them. Little is known, however, about the level of adoption of ePHRs in Canada and there is limited evidence concerning their benefits and implications for the healthcare system. This study aimed to describe the current ...
ISSUES IN MULTICAST SECURITY
abstract this study aimed at investigating the impact of etymology strategy instruction on the development of vocabulary of iranian intermediate efl learners. etymology, knowledge of origin of words, roots, and affixes, has proved to be a controversial issue and a question of long debate with regard to its impact on the process of vocabulary learning. this study employed etymology strategy in ...
The Social Security Organization, according to The List of Non-governmental Organizations and Public Institutions Act, is a non-governmental public organization. It currently supports about 33 million workers, retirees and their families. Always there is alignment among the main objectives of social security and economic objectives of the country. All the factors that effect on econom...
In recent years, business process models are used to de ne security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However, because the symbols of process-related se...
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test en...
Extended Abstract Multicast communications have generated increasing interest during the past few years. This is due, in principle, to the obvious potential for improvement in the use of network resources: data is sent to a number of diierent recipients in just one transmission, instead of requiring the setup and the maintenance of distinct unicast connections. This means substantial savings bo...
The consideration of security requirements in the development of multi-agent systems is a very difficult task. However, only few approaches have been proposed that try to integrate security issues as internal part of the development process. Amongst them, secure Tropos has been proposed as a structured approach towards the consideration of security issues in the development of multiagent system...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید