نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2006
Wen Ding William Yurcik

Dynamic and complex information security risks facing organizations are forcing them to take a hard look at outsourcing to Managed Security Service Providers (MSSPs). The potential advantage of outsourcing is to improve security levels at lower costs. Potential risks of outsourcing to an MSSP includes service quality uncertainty and the business risk of MSSP bankruptcy. In this paper we present...

Fatemeh Vafi sani Fereshteh Bahrami Mahdiye Jafari, Masumeh Saeidi, Mohammad Mobin Mirimoghaddam Rahele Rahimi Reza Ahmadi Sahebeh Dadshahi

Telemedicine refers to a kind of treatment in which all medical interventions, diagnoses, treatment decisions, and recommendations are made using the patient’s data, documents, and other information transmitted through telecommunication systems. Telemedicine might run between one patient and one physician or one patient and several physicians, including other healthcare specialists. Telemedicin...

Journal: :Nature 1957

Journal: :Future Generation Comp. Syst. 2012
Jianxin Li Bo Li Tianyu Wo Chunming Hu Jinpeng Huai Lu Liu K. P. Lam

With energy and power costs increasing as the size of IT infrastructures grows, virtualization technologies enable scalable management for large scale of virtual machines running on physical systems, and virtualizationbased green cloud computing paradigm is springing up to provide a scalable and energy-efficient network software application (NetApp in short) supplement, consumption, delivery mo...

2016
Mourade Azrour Mohammed Ouanan Yousef Farhaoui Moulay Ismail

Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming...

2008

, newly elected ukrainian parliament still unable to make any definite decision concerning possible head of ukrainian security service. Who comes to us with a sword dies from the sword. 1. Why ukrainian parliament decides the question of NATO membership 2. Who is responsible 3. Ukraine is a slavic country 4. Some further perspectives The following brief survey may be considered as some comments...

2003
Raj Mohan Timothy E. Levin Cynthia E. Irvine

The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks. Dynamic parameterization of IPsec, via the KeyNote trust management system, further enables security mechanisms to adjust the level of security service “on-the-fly” to respond to changing network and operational cond...

Journal: :Scalable Computing: Practice and Experience 2016
Valentina Casola Alessandra De Benedictis Massimiliano Rak Umberto Villano

The perception of lack of control over resources deployed in the cloud may represent one of the critical factors for an organization to decide to cloudify or not its own services. The flat security features offered by commercial cloud providers to every customer, from simple practitioners to managers of huge amounts of sensitive data and services, is an additional problem. In recent years, the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید