نتایج جستجو برای: security issues in summary process

تعداد نتایج: 17146815  

Journal: :Annales des Télécommunications 2000
Thomas Hardjono Gene Tsudik

Security represents one of the major obstacles today to the wider deployment of IP mul-ticast. The current work identiies and discusses the various concepts and issues underlying multicast security. A classiication of the current issues is provided, covering some core problems , infrastructure problems, and the complex applications that may be built atop a secure IP multicast. Three broad core ...

2015
Krishan Chand Muthu Ramachandran Ah-Lian Kor

In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be a...

Journal: :مدیریت ورزشی 0
مهرعلی همتی نژاد . استاد مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی دانشگاه گیلان، رشت، ایران تریسی تیلور . استاد مدیریت ورزشی، دانشکدۀ مدیریت دانشگاه تکنولوژی سیدنی، سیدنی، استرالیا محمدحسن قلی زاده دانشیار مدیریت مالی، دانشکدۀ ادبیات و علوم انسانی دانشگاه گیلان، رشت، ایران رسول فرجی . استادیار مدیریت ورزشی، دانشکدۀ علوم تربیتی و روان شناسی دانشگاه شهید مدنی آذربایجان، تبریز، ایران

this study aimed at identifying critical factors affecting the security of iranian football stadiums and prioritizing them using the analytical hierarchy process (ahp) for future decisions. in the qualitative stage of the study, the main factors affecting the security of iranian football stadiums were identified in 12 semi-structured interviews with experts. in the quantitative stage, 17 expert...

2010
Hui Wang Shulan Gao Bibo Lu Zihao Shen

Nowadays, mostly security solutions are mainly focused on how to defend against various threats, including insider threats and outsider threats, instead of trying to solve security issues from their sources. In this paper, a security requirements engineering process is presented for security requirements elicitation and analysis. And the proposed process will deal with the security requirements...

Journal: :Communications on Applied Electronics 2015

Journal: :Blockchain Frontier Technology 2022

In the past couple of years block chain has acquired a parcel prominence in light fact that blockchain is center innovation bitcoin. Its use cases are filling number fields like security Internet Things (IoT), banking area, enterprises and clinical focuses. Also, IoT extended its acknowledgment as result organization brilliant homes city improvements around world. Sadly, network gadgets work on...

Journal: :Bulletin of the South Ural State University series "Law" 2016

Journal: :TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH 2019

Journal: :Innovatics and Expert Examination 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید