نتایج جستجو برای: security concerns
تعداد نتایج: 280401 فیلتر نتایج به سال:
This chapter describes our approach to handle security in a complex Distributed Virtual Environment (DVE). The modules of such an environment all need to be concerned about security. An object-oriented model of a DVE allows us to capture security in an aspect-oriented fashion as a crosscutting concern among the multiple modules. As DVEs become more complex in content, distribution, and capabili...
increasing the popularity of sip based services (voip, iptv, ims infrastructure) lead to concerns about its security. the main signaling protocol of next generation networks and voip systems is session initiation protocol (sip). inherent vulnerabilities of sip, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in sip based infra...
This paper tries to address the impact of the Shanghai Cooperation Organization on Central Asian security. This organization was established on April 26, 1996 to settle security and territorial disputes between China and Russia and Central Asian countries (other than Uzbekistan and Turkmenistan). After the accession of Uzbekistan to this assembly, the level of the organization was promoted, and...
This paper tries to address the impact of the Shanghai Cooperation Organization on Central Asian security. This organization was established on April 26, 1996 to settle security and territorial disputes between China and Russia and Central Asian countries (other than Uzbekistan and Turkmenistan). After the accession of Uzbekistan to this assembly, the level of the organization was promoted, and...
The increasing dependence of European Union member countries on imported oil and gas has led to concerns about energy supply and security. At the same time the share of clean energy in Europe’s energy consumption basket is increasing due to environmental issues. About a quarter of all energy consumption in the EU is natural gas, and most EU member states import almost all of their energy resou...
Cloud computing is one of the coming forth as well as the buzzword concept nowadays. Cloud computing serves various advancement in the field of IT industry such as Google, Microsoft, Amazon and distinguish various data and information resources from a given infrastructure in order to enhance the services provided to the end users. End users have paid tremendous focus in implementing cloud compu...
In the current IoT (Internet of Things) environment, more and more Things: devices, objects, sensors, and everyday items not usually considered computers, are connected to the Internet, and these Things affect and change our social life and economic activities. By using IoTs, service providers can collect and store personal information in the real world, and such providers can gain access to de...
Modeling of security policies, along with their realization in code, must be an integral part of the software development process, to achieve an acceptable level of security for a software application. Among all of the security concerns (e.g. authentication, auditing, access control, confidentiality, etc.), this paper addresses the incorporation of access control into software. The approach is ...
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید