نتایج جستجو برای: digital public control
تعداد نتایج: 1933416 فیلتر نتایج به سال:
The Internet has democratized speech, creating a forum for public self-expression and connecting billions of speakers listeners who never could have found each other before. is not without faults, to be sure, but before so many people been afforded opportunities speak, heard, share information with others. Just as printing made everyone potential reader, today digitalisation making into author....
This article discusses some issues of understanding the digitalization public administration, as well legal development digital administration. The author identifies problems that hinder suggests opinions on further
The direction of scientific research is determined by the global spread informatization process, which increases urgency introducing digital technologies in field public administration. purpose studyis to highlight basics implementing administration modern conditions social development, taking into account most successful and progressive practices. methodological basis a systematic approach, ma...
Current e-Government applications focus on means and procedures that deliver public services to citizens, in order to improve the quality of public services and minimize expenditures in public transactions. In this paper we examine how digital means offer the proper environment for the Administration to become a Trusted Partner for citizens in all everyday situations. We are inspired by a case ...
A group digital signature technique using a digital signature algorithm and a challenge-response identification protocol is proposed to provide effective authentication. The proposed digital signature algorithm is based on solving quadratic congruence, factorization. and discrete logarithm problems. Based on the public key infrastructure, group members generate their public-private keys first. ...
In this article, we argue that traditional approaches for authorization and access control in computer systems (i.e., discretionary, mandatory, and role-based access controls) are not appropriate to address the requirements of networked or distributed systems, and that proper authorization and access control requires infrastructural support in one way or another. This support can be provided, f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید