نتایج جستجو برای: keywords human security
تعداد نتایج: 3647114 فیلتر نتایج به سال:
Today, many organizations are moving their computing services towards the Cloud. This makes their computer processing available much more conveniently to users. However, it also brings new security threats and challenges about safety and reliability. In fact, Cloud Computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and sc...
Cloud computing is spreading around the world with leaps and touching every part of communication era with Internet technology. Rapid growth of the communication techniques and devices are adding the requirements to bind all of these devices under one hood. Cloud is becoming a perfect solution for the same. With this rapid penetration of cloud computing in human life creating many new challenge...
The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of ...
Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...
Currently, HTTP Strict Transport Security, used to harden HTTPS, has gained increasing adoption in browsers and servers. We conduct an in-depth empirical security study of HSTS implementation in browsers, then successfully discover several new flaws in storage implementation and interaction with certificates. These flaws enable cookies theft, DoS, and bypassing problems. Moreover, we point out ...
Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...
one of the main objectives of development policies in different countries is food security. extensive researches around the world specially during last decades show the role of nutrition in health, food security, increase of efficiency and economic development. considering that a healthy diet and having access to sufficient and healthy foods are the basic human rights, governments are obliged t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید