نتایج جستجو برای: private extension

تعداد نتایج: 247767  

Journal: :International journal of advanced research 2022

The urban dynamics have been very important over the last two decades in town of Abidjan.The front pioneers these spatial extension phenomena are peripheries which areexpanding to meet high demand for housing Abidjanese and often underequipped with commercial infrastructures. Angre extension, a residential area located north municipality Cocody, is part this dynamic demographic pressure arecomp...

2002
Päivi Kallio Jarkko Holappa Pavel Ivanchev

Attacks against the information flowing on the Internet cause a serious security threat nowadays, and force the developers to consider the system security aspects. This paper presents the use and suitability of Virtual Private Networks (VPNs) in the prevention of security breaches. An Open Service Gateway Initiative (OSGi) platform is presented and integration with VPN is studied as a case stud...

2015
Gail Truman Jaime Henderson

This poster session describes the selection criteria and process used for evaluating three repository software offerings and cloud platforms, with pros and cons. It describes implementation of workflows, representations of PREMIS metadata for objects in the repository, documenting fixity checks performed on datastreams, mapping of “rights” elements in DC datastreams to PREMIS “rightsExtension” ...

2002
Nikos Manouselis Demetrios Sampson

In this paper, we present a multi-criteria decision aid methodology optimizing the performance of Service Provider Agents in a Virtual Private Network, according to the Specifications posed by the Foundation for Intelligent Physical Agents (FIPA). We enhance the basic protocol steps for a service brokering procedure, and apply the methodology to a specific case of Network Providers: the Interne...

Journal: :RFC 2005
Benson Schliesser Thomas D. Nadeau

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes Textual ...

2003
Gustav Rosenbaum William Lau Sanjay Jha

VPN services has been around for decades but it did not get wide-spread usage until recently. A combination of new VPN technologies, network technologies and business communication requirements are the driving force behind the VPN services. This survey gives an overview of the recent approaches of VPN solutions and compare their scalability and flexibility aspects. The survey also categorises V...

Journal: :Telematics and Informatics 2014
Cheng-Yuan Ku Pei-Chen Sung Wen-Huai Hsieh

Although the policy of the separation of dispensing from the medical practice (SDMP) has been promoted by the Department of Health (DOH) in Taiwan for many years, it has never been significantly successful. Instead of transferring prescriptions to the insurance-contracted pharmacy (ICP) in the community, most of the patients still fill their prescriptions in the hospital or clinic. This is beca...

2002
Michael Altenhofen Joachim Schaper

This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. More specifically this paper focuses on a new approach of meta-tagging learning elements to enable the flexible execution of courses depending on the individual learning style of the student. The notion of a content ag...

Journal: :CoRR 2013
Osuolale Abdulrahamon Tiamiyu

Though objectives of trusted routing and virtual private networks (VPN) data transfer methods are to guarantee data transfer securely to from senders to receivers over public networks like Internet yet there are paramount differences between the two methods. This paper analyses their differences.

2002
Thomas L. Wolfe Yih-Chiao Joseph Liu Hsin-Ping Pat Chang

Many organizations are discovering the need to protect themselves with isolation routers, Jirewalls, and other technologies. Simultaneously they are collaborating more and more with external organizations. When local services and resources must be shared externally, problems arise. There are many approaches to these problems. For example, a Virtual Private Network (VPN) can provide external use...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید