نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

Journal: :the archives of bone and joint surgery 0
hamidreza aslani shahid beheshti university of medical sciences, knee and sport medicine education and research center, tehran, iran seyed taghi nourbakhsh orthopaedic department milad hospital, knee and sport medicine education and research center, tehran, iran farivar a lahiji department of orthopedic surgery, shahid beheshti university of medical sciences, tehran, iran keykavoos heydarian department of orthopedic surgery, iran university of medical sciences, tehran, iran mahmood jabalameli department of orthopedic surgery, iran university of medical sciences, tehran, iran mohammad taghi ghazavi department of orthopedic surgery, iran university of medical sciences, tehran, iran

periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. in this article we introduce the methodology used for the foundation of the national iranian joint registry (ijr) with a joint collaboration of the social security organization (sso) and academic research depar...

Journal: :Inf. Manag. Comput. Security 2013
Stefan Taubenberger Jan Jürjens Yijun Yu Bashar Nuseibeh

Purpose – In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses’ security needs are not considered sufficiently. Hence, security functions may not protect business asse...

2004
Mike Barley Fabio Massacci Haralambos Mouratidis Paul Scerri

There is a growing need for the evaluation and certification of distributed systems regarding security standards. Almost all existing multi-agent systems that have been developed in the context of the telecommunications market neglect strong security evaluations. In particular, an evaluation of a multi-agent system based on the widely accepted and well known Common Criteria standard has not bee...

2013
Kamel Karoui Fakher Ben Ftima Henda Ben Ghezala

Security components such as firewalls, IDS and IPS, are the most widely adopted security devices for network protection. These components are often implemented with several errors (or anomalies) that are sometimes critical. To ensure the security of their networks, administrators should detect these anomalies and correct them. Before correcting the detected anomalies, the administrator should e...

2013
Irfan Syamsuddin

Information security plays a significant role in recent information society. Increasing number and impact of cyber attacks on information assets have resulted the increasing awareness among managers that attack on information is actually attack on organization itself. Unfortunately, particular model for information security evaluation for management levels is still not well defined. In this stu...

2008
Melanie Volkamer Rüdiger Grimm

Remote electronic voting systems are more and more used not so much for parliamentary elections, but nevertheless for elections on lower levels as in associations and at universities. In order to have a basis for the evaluation and certification, in Germany a Common Criteria Protection Profile [PP08] is developed, which defines basic requirements for remote electronic voting systems. This Prote...

1997
Rodolphe Ortalo Yves Deswarte

This paper presents a method for the specification and evaluation of the security of information systems. This method is based on an extension of deontic logic, a formal language adapted for this task. First, we outline briefly the overall guidelines of the method and the various aspects of the security policy specification process. Then, the formalism is defined and extensions are proposed. To...

2016
Shu Wu Qiang Liu Ping Bai Liang Wang Tieniu Tan

Public security events are occurring all over the world, bringing threat to personal and property safety, and homeland security. It is vital to construct an effective model to evaluate and predict the public security. In this work, we establish a Situation-Aware Public Security Evaluation (SAPE) platform. Based on conventional Recurrent Neural Networks (RNN), we develop a new variant of RNN to ...

2007
Peter Clutterbuck Terry Rowlands

Wireless Local Area Networks (WLANs) provide many significant advantages to the contemporary business enterprise. WLANs also provide considerable security challenges for network administrators and users. Data confidentiality (ie, unauthorised access to data) breaches are the major security vulnerability within WLANs. To date, the major IT security standards from the International Standards Orga...

Journal: :مدیریت ورزشی 0
مسعود نادریان جهرمی دانشگاه اصفهان حسین پورسلطان زرندی پژوهشکده تربیت بدنی الهام روحانی دانشگاه اصفهان

the main aim of this study was to identify and present indicators and standards necessary for security management of sport facilities. these standards were recognized via a set of interviews and questionnaires through delphi method. the revised questionnaire of panteza et al. (2003) with 0.89 of reliability and interviews were used to collect data. the subjects were selected from purposeful sam...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید