نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this framework emphasizes lightweight software infrastructures that maintain minimal state, and interface to current and emerging distributed computing standards. In this model, resource owners host a software backplane onto which owners, clients,...
In 2007, Gaborit et al. proposed the stream cipher SYND as an improvement of the pseudo random number generator due to Fischer and Stern. This work shows how to improve considerably the efficiency the SYND cipher without using the so-called regular encoding and without compromising the security of the modified SYND stream cipher. Our proposal, called XSYND, uses a generic state transformation w...
Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data is that the two filesystem security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an arbitrary number of users and groups, while UNIX NFS servers us...
My research interest is in networked systems and surrounding areas, such as distributed systems, computer networks, and security/privacy. I have worked on various projects including smartphone security and privacy [2–4, 11, 13], network architecture to protect user privacy [5, 15], reliable distributed systems [9], and mobile systems for voice and vision interactions [7, 8]. In my dissertation,...
Received: 1 November 2008 Revised: 27 July 2009 Accepted: 27 July 2009 Online publication date: 7 January 2010 Abstract Although multinationals operate under cross-border jurisdictions, the relevance of interstate security relations to international business has received little attention. Despite the impressive accumulation of knowledge in international business and international relations, the...
Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work...
background: there are high levels of sexual harassment in health care systems. also, workplace violence occurs against ethnic and racial minorities. this study aimed to identify the frequency of and the factors contributing to and preventing sexual and racial harassment in the workplace towards health professionals in iran. methods: this cross-sectional study was conducted on 6500 out of 57000 ...
Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of information systems. This paper addres...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید