نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2011
Pascal Bou Nassar Youakim Badr Frédérique Biennier Kablan Barbar

In order to secure collaborative business processes, we present a methodological approach that early integrates security and risk management throughout the design process of service-oriented architectures. We develop our methodology based on two complementary axes: the first being the business needs while the second, is ensuring a consistent security between partners at the runtime. The informa...

Abedi, Heydar ali, Alimohammadi, Nasrolah, Daryabeigi, Reza, Khademi, Moghgan,

Abstract Introduction: In order to determine nurses’ educational needs in supporting family members of hospitalized elderly patients’, the needs of these care givers should be recognized. This study was performed with the goal to obtain and understand the lived experience of patients’ family caregivers regarding their needs. Methods: In a qualitative study with phenomenological method, the...

2005
Jan Tobias Mühlberg

Computer programs are used in almost every area of our daily life. Especially in fields like medical computing and the whole sector of security systems they became almost vital or at least mission critical. One of the main problems of software engineering is to develop programs that are reliable enough to meet the needs of a mission critical appliance. Several approaches are taken to prove that...

2012
Edouard Geoffrois Zygmunt Vetulani Wojciech Czarnecki Bartłomiej Kochanowski Milan Rusko Sakhia Darjaa Marian Trnka Laura Chaubard Adam Dąbrowski Szymon Drgas Paweł Pawłowski

Language technologies and the associated language resources necessary to develop them are needed in a number of applications in the public security sector, and there is a growing demand for such applications. The paper illustrates the scope and importance of the needs by presenting various examples of applications along with the corresponding language technologies and language resources. Howeve...

2010

In what case do you like reading so much? What about the type of the transactions on computational science xi special issue on security in computing part ii 1st edition book? The needs to read? Well, everybody has their own reason why should read some books. Mostly, it will relate to their necessity to get knowledge from the book and want to read just to get entertainment. Novels, story book, a...

Journal: :CoRR 2006
Tariq N. Ellahi Benoit Hudzia Liam McDermott M. Tahar Kechadi

Grid computing has enabled pooling a very large number of heterogeneous resource administered by different security domains. Applications are dynamically deployed on the resources available at the time. Dynamic nature of the resources and applications requirements makes needs the grid middleware to support the ability of migrating a running application to a different resource. Especially, Grid ...

1998
Eyk Hildebrandt Gunter Saake

The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for a successful authorization is not considered sufficiently in current architectures. Due to the autonomy and heterogeneity of the component database systems, the problem of authentication in multidatabase systems is mor...

Journal: :Future Internet 2012
Quynh Lê Hoang Boi Nguyen Tony Barnett

Smart homes are homes with technologically advanced systems to enable domestic task automation, easier communication, and higher security. As an enabler of health and well-being enhancement, smart homes have been geared to accommodate people with special needs, especially older people. This paper examines the concept of “smart home” in a technologically driven society and its multi-functional c...

2010
K. Duraiswamy G Palanivel

To face the growing trend of attack and other security challenges, Intrusion Detection System have to be addressed across the network. Each TCP/IP network layer has specific type of network attacks and hence it needs a specific type of IDS. So, depending upon the TCP / IP network model, we can categorize the IDS into AIDS, TIDS, NIDS, LIDS and each IDS type is specialized to a specific network ...

2004
Yong Song Victor C. M. Leung Konstantin Beznosov

Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. In contrast to SSL, MC-SSL can securely provide applications with multiple channels, and each of them can have a specific cipher suite and a various number of application proxies; meanwhile, the channel negotiation and operation in MC-SSL are still based on SSL, which needs a small change in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید