نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

2012
M. Madhavi

Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and sc...

Journal: :TEION KOGAKU (Journal of Cryogenics and Superconductivity Society of Japan) 2008

Journal: :Communications on Applied Electronics 2015

2013
Shweta Jain Prateek Gupta

Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With this rapid penetration of cloud computing in human life creating many new challenge...

2015
Saleh Al-umaran

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of ...

2016
Dorottya Papp Zhendong Ma Levente Buttyan

Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...

2017
Yan Jia Yuqing Zhang

Currently, HTTP Strict Transport Security, used to harden HTTPS, has gained increasing adoption in browsers and servers. We conduct an in-depth empirical security study of HSTS implementation in browsers, then successfully discover several new flaws in storage implementation and interaction with certificates. These flaws enable cookies theft, DoS, and bypassing problems. Moreover, we point out ...

2015
Kumar Saurabh

Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...

Journal: :حقوق خصوصی 0
عهدیه السادات افضلی حسینی دانشجوی کارشناسی ارشد حقوق خصوصی، دانشگاه آزاد اسلامی کرمان محمدرضا امیرمحمدی استادیار گروه حقوق خصوصی ، دانشگاه شهید باهنر کرمان ایوب احمد پور گهرت استادیار گروه حقوق خصوصی ، دانشگاه شهید باهنر کرمان

one of the main objectives of development policies in different countries is food security. extensive researches around the world specially during last decades show the role of nutrition in health, food security, increase of efficiency and economic development. considering that a healthy diet and having access to sufficient and healthy foods are the basic human rights, governments are obliged t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید