نتایج جستجو برای: security papers

تعداد نتایج: 265761  

Journal: :Computers & Security 1995
Marshall D. Abrams Michael V. Joyce

This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...

Journal: :Plants, people, planet 2021

This special issue, brought together during a time of unprecedented global change, represents unique collection papers that shed light on the current and future significance mycorrhiza-forming fungi in human world. Across this selection papers, we explore potential mycorrhizal to contribute towards our achievement change goals improved sustainability, food security conservation as well how migh...

2008
Shinichi HONIDEN Bashar NUSEIBEH Haruhiko Kaiya Kouta Sasaki Nobukazu Yoshioka Hironori Washizaki Karel Bartoš Martin Grill

The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving ov...

2004
Jonathan D. Moffett Charles B. Haley Bashar Nuseibeh Jonathan D Moffett Charles B Haley

Although security requirements engineering has recently attracted increasing attention, it has lacked a context in which to operate. A number of papers have described how security requirements may be violated, but apart from a few hints in the general literature, none have described satisfactorily what security requirements are. This paper proposes a framework of core security requirements arte...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

حسین زاده, علی حسین, منصوری, لفته, نواح, عبدالرضا,

Purpose: This study attempts to identify work alienation, and the effect of organizational culture on this, using a sociological approach. Methodology: The method used for this study is a survey and data collected by questionnaire. The population of this study is all librarians from public libraries in the Khuzestan province. The data were analyzed using the software SPSS16. To test the hypoth...

Journal: :Journal of Computing and Information Technology 2022

The present issue is the last one of 2021 volume CIT. Journal Computing and Information Technology (Vol. 29, No. 4 – December 2021) consists papers from areas software engineering, security privacy, big data.

2016
Jong Hyuk Park

The Journal of Information Processing Systems (JIPS), which is the official international journal of the Korea Information Processing Society, aims to enable researchers and professionals to promote, share, and discuss all major research issues and developments in the field of information processing technologies and other related fields. JIPS publishes diverse papers, including theoretical rese...

1999
Ana Paula Manuel Santos

The working paper publication series is designed to provide users with timely research results while refinements and longer term synthesis are completed, and final reports are available. The preparation of working papers and their discussion with those who design and influence programs and policies in Mozambique is an important step in the Directorates's overall analysis and planning mission. C...

Journal: :Computer Communications 2009
Mohammed Aijaz Ahmed D. Rajya Lakshmi Sayed Abdul Sattar

In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al’s scheme has been proposed bu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید