نتایج جستجو برای: government protocol

تعداد نتایج: 377577  

2005
Yan Yang Leslie Cheung Leana Golubchik

This paper investigates a data assignment problem in a fault tolerance protocol of Bistro, a wide area upload framework. Uploads correspond to an important class of applications, whose examples include a large number of digital government applications. Specifically, government at all levels is a major collector and provider of data, and there are clear benefits to disseminating and collecting d...

2012
Mahdieh Taher Zhenbin Yang Atreyi Kankanhalli

There is a growing interest in public-private partnerships (PPPs) as a model for e-government service development and delivery. Although various underlying benefits of such arrangement have been enumerated, there exist challenges and issues in PPPs manifest in a number of unsuccessful cases. The success of PPPs in e-government depends on a number of factors that need to be considered from the f...

Journal: :The South African journal of communication disorders = Die Suid-Afrikaanse tydskrif vir Kommunikasieafwykings 2016
Jaishika Seedat Claire Penn

Oral care is a crucial routine for patients with dysphagia that, when completed routinely, can prevent the development of aspiration pneumonia. There is no standardised protocol for oral care within government hospitals in South Africa. This study aimed to investigate the outcome of an oral care protocol. Participants were patients with oropharyngeal dysphagia, with either stroke or traumatic b...

2010
G. K. PRADHAN

This paper appraises the status of the advanced art in the section of attractive digital government interoperability and security by means of widespread models. Interoperability proposes to the exercise of Information and Communication Technologies to smooth the progress of the harmonization of work and information flow. Interoperability articulates to a property of special systems and organiza...

2009
Athanasios Drigas Leyteris Koukianakis

E-government includes fast and improved citizen service from a quantitative and qualitative point of view, as well as the restructuring and reengineering of organizations and their services, through the increased usage and exploitation of the capabilities and services of ICT’s and the Internet. The escalation of the e-government services begins with easy access to governmental information and p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2014
Chalama Reddy R. Seshadri Chang-Tsun Li Violetta Cavalli-Sforza Jaime G. Carbonell Peter J. Jansen Md. Headayetullah G. K. Pradhan Muntaha Alawneh Imad M. Abbadi Achille Fokoue Mudhakar Srivatsa Pankaj Rohatgi Peter Wrobel John Yesberg

Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. The organizations that do sensitive work such as those with defense contracts, passport issuing agencies, military activities, and health care data at health-insurance, are in need of protecting their information. Nowadays, financia...

Journal: :JASIST 2005
Peng Liu Amit Chetal

The September 11 attack and the following investigations show that there is a serious information sharing problem among the relevant federal government agencies, and the problem can cause substantial deficiencies in terrorism attack detection. This paper performs a systematic analysis of the causes of this problem; and it finds that existing secure information sharing technologies and protocols...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1385

acknowledge the importance of e-commerce to their countries and to survival of their businesses and in creating and encouraging an atmosphere for the wide adoption and success of e-commerce in the long term. the investment for implementing e-commerce in the public sector is one of the areas which is focused in government‘s action plan for cross-disciplinary it development and e-readiness in go...

2005
Koutarou Suzuki Makoto Yokoo

In this paper, we develop a secure multi-attribute procurement auction, in which a sales item is defined by several attributes called qualities, the buyer is the auctioneer (e.g., a government), and the sellers are the bidders. We first present a Vickrey-type protocol that can be used for multi-attribute procurement auctions. Next, we show how this protocol can be executed securely. key words :...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید