نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
the letter of credit as a method of smoothing international payment is a conditional security and obligation to pay the customer bank (issuing bank) to seller (applicant). for this purpose, the letters of credit may be considered as the most usual method of payment of goods price in international trade. the classic form of letters of credit is the commercial letters of credit whose financial ob...
the research discussed in this article consists of the process ended to propos a structure for social welfare and security which took more than 11 months in social security research institute. the main topics discussed are as follows: 1- the importance of social security and its relationship to economic growth, social justice, human generosity and national honor. 2- the basis and opportunities ...
in recent years the most powerful and effective negotiations to change elements of the united nations, the security council, has sparked a wide debate benefits and special privileges of members of the security council such as the right to veto the, imposing sanctions has forced some states to opposite white this order and 5 permanent members of the security council on the path to maintain the s...
Abstract According to the World Health Organization in 2007, peoplechr('39')s vulnerability to severe, rapid and new threats to their health security must be reduced. Because most people today feel insecure about worries about their daily lives, it is essential to create a new environment in which health security becomes a basic concern for all. Meanwhile, the marine crew needs special attent...
A wireless router is a networking device that enables a user to set up a wireless connection to the Internet. A router can offer a secure channel by cryptographicmeans which provides authenticity and confidentiality. Nowadays, almost all routers use a secure channel by default that is based on Wi-Fi Protected Access II (WPA2). This is a security protocol which is believed not to be susceptible ...
The main Internet security problems nowadays can be reduced to three major fields: Hackers have software programs that scan automatically networks for security weaknesses, more and more PC’s are connect directly to the Internet without using security mechanisms and E-Commerce paradigms require high quality consumer access that contradicts security objectives. As we will show in this paper, seve...
In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to asmulti-administrative domain networks. Each domainmight have its own securit...
Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec ...
Bring Your Own Device (BYOD) is attracting considerable attention nowadays. In BYOD scenarios, enterprises wish to integrate their employees’ mobile devices in enterprise operations (e.g., reading emails, editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security t...
Resource management across diverse workloads is a non-trivial and challenging problem. The complexity of the problem skyrockets when the system needs to arbitrate resources across arbitrary and potentially malicious users. Such is the problem faced by multi-tenant public cloud systems. These systems, apart from achieving profitable resource utilization for the cloud provider, should also guaran...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید