نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...
This special issue, brought together during a time of unprecedented global change, represents unique collection papers that shed light on the current and future significance mycorrhiza-forming fungi in human world. Across this selection papers, we explore potential mycorrhizal to contribute towards our achievement change goals improved sustainability, food security conservation as well how migh...
The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving ov...
Although security requirements engineering has recently attracted increasing attention, it has lacked a context in which to operate. A number of papers have described how security requirements may be violated, but apart from a few hints in the general literature, none have described satisfactorily what security requirements are. This paper proposes a framework of core security requirements arte...
the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
Purpose: This study attempts to identify work alienation, and the effect of organizational culture on this, using a sociological approach. Methodology: The method used for this study is a survey and data collected by questionnaire. The population of this study is all librarians from public libraries in the Khuzestan province. The data were analyzed using the software SPSS16. To test the hypoth...
The present issue is the last one of 2021 volume CIT. Journal Computing and Information Technology (Vol. 29, No. 4 – December 2021) consists papers from areas software engineering, security privacy, big data.
The Journal of Information Processing Systems (JIPS), which is the official international journal of the Korea Information Processing Society, aims to enable researchers and professionals to promote, share, and discuss all major research issues and developments in the field of information processing technologies and other related fields. JIPS publishes diverse papers, including theoretical rese...
The working paper publication series is designed to provide users with timely research results while refinements and longer term synthesis are completed, and final reports are available. The preparation of working papers and their discussion with those who design and influence programs and policies in Mozambique is an important step in the Directorates's overall analysis and planning mission. C...
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al’s scheme has been proposed bu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید