نتایج جستجو برای: security concerns
تعداد نتایج: 280401 فیلتر نتایج به سال:
The digital revolution has taken business sectors to a new height through the advancement of technology. healthcare sector also embraced technology facilitate technological change from mechanical and analogue electronic devices that is available today. common use in includes searching medical knowledge resources, monitoring quality patient care improving clinical support. article presents impac...
The extended use of high and very high spatial resolution imagery inherently demands the adoption of classification methods capable of capturing the underlying semantic. Object-oriented classification methods are currently considered as the most appropriate alternative, due to the incorporation of contextual information and domain knowledge into the analysis. Integrating knowledge initially req...
Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a signific...
Mandatory label-based policies may be used to support a wide-range of application security requirements. Labels encode the security state of system entities and the security policy speciies how these labels may change. Building on previous results, this paper develops a model for a kernelized framework for supporting these policies. The framework provides the basis for, what is essentially, an ...
Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...
Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain ”Why” (attack objective), ”What” (i.e., system assets, goals, etc.), and ”How” (attack method), adversary achieved his attack goals. We introduce in this paper a s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید