نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

2006
Yun Bai

This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through...

Journal: :سیاست 0
محمدعلی شهریاری دانشگاه آزاد بوشهر

among others internal, regional, international, political, economic, technical, social and cultural factors are reasons that theorists introduce for beginning of integration at a region. by looking at the functions of the shanghai cooperation organization and the association of southeast asian nations (asean), we understand that there are two basic pragmatic factors, the support of the great po...

Journal: :international journal of environmental research 0

during the 1960s, the relatively new approaches like environmental warfare and intentional environmental deterioration came in to the global security and strategic literature. till now, through different conventional and unconventional wars, the governments have imposed intentional and unintentional adverse effects on the environment some of which are lasting for decades. the application of wea...

Iran’s foreign policy toward international organizations has always oscillated between divergence and convergence, depending on the status of the country in question and the statesmen's point of the view. This study aimed to examine the status of international organizations in Iran’s foreign policy. A divergent approach to international organizations was adopted during 1981-1988 and 2005-2013. ...

Abstract: Interpol international cooperation (With emphasis on the International Convention on the fight against drug trafficking and transnational organized crime) Drug trafficking and international organized crime threat to the security of the international community and especially of humanity itself. In response to this issue is one of the most important measures to combat these crime...

Journal: :سیاست 0
نبی الله ابراهیمی

explanation and evaluation of the book “rational choice and security studies, stephen walt and its critics”, edited by brown owen and lynn josomiller, has taken place in fact in the direction of exploration of the knowledge of security studies in international relations. in terms, examination of walt’s rational choice approach, and the formal-mathematical model, can help us to present a clear a...

2011
Suku Nair Subil Abraham Omar Al-Ibrahim

There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security...

2017
Arran Schlosberg

Sir, I write with respect to the Technical Note “Generating unique identifiers (IDs) from patient identification data using security models,”[1] the authors of which propose a method to “create a unique one‐way encrypted ID per patient that can be used for data sharing.” In summary, their method involves concatenation of a patient’s date of birth, sex, and surname, utilizing either the MD5 or S...

Journal: :مطالعات حقوق خصوصی 0
جعفر کوشا پیمان نمامیان

one of the most important challenge facing international community and international criminal law is the increasing expansion of terrorist acts and operations which is a serious threat to international peace and security. this dreadful phenomenon usually occurs in organized forms transnationally. threats caused by terrorism are more than individual offences and to encounter it effectively is in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید