نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

Journal: :Parallel Processing Letters 2003
Dawid Kurzyniec Tomasz Wrzosek Dominik Drzewiecki Vaidy S. Sunderam

A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this framework emphasizes lightweight software infrastructures that maintain minimal state, and interface to current and emerging distributed computing standards. In this model, resource owners host a software backplane onto which owners, clients,...

2012
Mohammed Meziani Gerhard Hoffmann Pierre-Louis Cayrel

In 2007, Gaborit et al. proposed the stream cipher SYND as an improvement of the pseudo random number generator due to Fischer and Stern. This work shows how to improve considerably the efficiency the SYND cipher without using the so-called regular encoding and without compromising the security of the modified SYND stream cipher. Our proposal, called XSYND, uses a generic state transformation w...

1997
Dave Hitz Bridget Allison Andrea Borr Rob Hawley Mark Muhlestein

Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data is that the two filesystem security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an arbitrary number of users and groups, while UNIX NFS servers us...

2016
Seungyeop Han

My research interest is in networked systems and surrounding areas, such as distributed systems, computer networks, and security/privacy. I have worked on various projects including smartphone security and privacy [2–4, 11, 13], network architecture to protect user privacy [5, 15], reliable distributed systems [9], and mobile systems for voice and vision interactions [7, 8]. In my dissertation,...

2009
Quan Li Tatiana Vashchilko

Received: 1 November 2008 Revised: 27 July 2009 Accepted: 27 July 2009 Online publication date: 7 January 2010 Abstract Although multinationals operate under cross-border jurisdictions, the relevance of interstate security relations to international business has received little attention. Despite the impressive accumulation of knowledge in international business and international relations, the...

Journal: :CoRR 2013
Carlo Marcelo Revoredo da Silva Jose Lutiano Costa da Silva Ricardo Batista Rodrigues Leandro Marques Nascimento Vinicius Cardoso Garcia

Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work...

Journal: :international journal of community based nursing and midwifery 0
masoud fallahi khoshknab department of nursing, university of social welfare and rehabilitation sciences, tehran, iran; fatemeh oskouie center for nursing care research, department of nursing, school of nursing and midwifery, iran university of medical sciences, tehran, iran; nahid ghazanfari department of nursing, razi psychiatric hospital, tehran, iran; fereshteh najafi department of nursing, university of social welfare and rehabilitation sciences, tehran, iran; zahra tamizi department of nursing, university of social welfare and rehabilitation sciences, tehran, iran; shahla afshani deputy of nursing, ministry of health and medical education, tehran, iran;

background: there are high levels of sexual harassment in health care systems. also, workplace violence occurs against ethnic and racial minorities. this study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in iran. methods: this cross-sectional study was conducted on 6500 out of 57000 ...

2012
Taurayi Rupere Ngonidzashe Zanamwe

Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of information systems. This paper addres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید