نتایج جستجو برای: private extension
تعداد نتایج: 247767 فیلتر نتایج به سال:
The urban dynamics have been very important over the last two decades in town of Abidjan.The front pioneers these spatial extension phenomena are peripheries which areexpanding to meet high demand for housing Abidjanese and often underequipped with commercial infrastructures. Angre extension, a residential area located north municipality Cocody, is part this dynamic demographic pressure arecomp...
Attacks against the information flowing on the Internet cause a serious security threat nowadays, and force the developers to consider the system security aspects. This paper presents the use and suitability of Virtual Private Networks (VPNs) in the prevention of security breaches. An Open Service Gateway Initiative (OSGi) platform is presented and integration with VPN is studied as a case stud...
This poster session describes the selection criteria and process used for evaluating three repository software offerings and cloud platforms, with pros and cons. It describes implementation of workflows, representations of PREMIS metadata for objects in the repository, documenting fixity checks performed on datastreams, mapping of “rights” elements in DC datastreams to PREMIS “rightsExtension” ...
In this paper, we present a multi-criteria decision aid methodology optimizing the performance of Service Provider Agents in a Virtual Private Network, according to the Specifications posed by the Foundation for Intelligent Physical Agents (FIPA). We enhance the basic protocol steps for a service brokering procedure, and apply the methodology to a specific case of Network Providers: the Interne...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes Textual ...
VPN services has been around for decades but it did not get wide-spread usage until recently. A combination of new VPN technologies, network technologies and business communication requirements are the driving force behind the VPN services. This survey gives an overview of the recent approaches of VPN solutions and compare their scalability and flexibility aspects. The survey also categorises V...
Although the policy of the separation of dispensing from the medical practice (SDMP) has been promoted by the Department of Health (DOH) in Taiwan for many years, it has never been significantly successful. Instead of transferring prescriptions to the insurance-contracted pharmacy (ICP) in the community, most of the patients still fill their prescriptions in the hospital or clinic. This is beca...
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. More specifically this paper focuses on a new approach of meta-tagging learning elements to enable the flexible execution of courses depending on the individual learning style of the student. The notion of a content ag...
Though objectives of trusted routing and virtual private networks (VPN) data transfer methods are to guarantee data transfer securely to from senders to receivers over public networks like Internet yet there are paramount differences between the two methods. This paper analyses their differences.
Many organizations are discovering the need to protect themselves with isolation routers, Jirewalls, and other technologies. Simultaneously they are collaborating more and more with external organizations. When local services and resources must be shared externally, problems arise. There are many approaches to these problems. For example, a Virtual Private Network (VPN) can provide external use...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید