نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

2010
Erik Karlsson Ola Ågren Fredrik Georgsson

The number of threats to computers attached to networks continually increases. The focus of preventing security exploits has been on the network, while local exploits has been mostly overlooked. Many security problems in Unix systems stem from the way security is managed; by delegating all security decisions to object owners. There are a number of security frameworks which aim to remedy this in...

1974
Paul A. Karger Roger R. Schell

* This article is a reprint of a technical report [19] published in June 1974. The program listings from the appendices have been omitted, due to space constraints. The text has been retyped and the figures redrawn, but with no substantive changes. The references have been updated, as some were not yet in final form in 1974. ABSTRACT A security evaluation of Multics for potential use as a two-l...

Journal: :IJESDF 2009
Elias Pimenidis Christos K. Georgiadis

Web services development is a key theme in utilisation of the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and the way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance...

Journal: :international journal of environmental research 2014
c. shao y. guan c. chu r. shi m. ju

the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :Journal of Information Technology & Software Engineering 2018

Journal: :Journal of the Japan Institute of Energy 2018

Journal: :E3S web of conferences 2021

Cloud computing is a group of servers providing the on demand services to users rental basis. One by cloud Data Storage as Service. In Service user will outsource their sensitive data storage environment, where be stored and whenever needs data, they access from anywhere anytime using any device connected internet. critical issues in this security. When outsources vendor, vendor may leak user’s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید