نتایج جستجو برای: digital public control

تعداد نتایج: 1933416  

Journal: :Bulletin of Perm National Research Polytechnic University. Electrotechnics, Informational Technologies, Control Systems 2019

Journal: :Library Trends 2009
Nan Rubin

Television production has shifted rapidly from an analog process to one where virtually all programs are created and finalized as digital files. Such productions in public television are at great risk of being lost, because practices for long-term preservation of digital video are just now emerging, and because there is no mandate for preservation within the public broadcasting system. NDIIPP f...

Journal: :journal of biomedical physics and engineering 0
m taheri department of microbiology, school of medicine, kerman university of medical sciences, kerman, iran m darabyan ionizing and non-ionizing radiation protection research center (inirprc), shiraz university of medical sciences, shiraz,سازمان اصلی تایید شده: دانشگاه علوم پزشکی کرمان (kerman university of medical sciences) e izadbakhsh ionizing and non-ionizing radiation protection research center (inirprc), shiraz university of medical sciences, shiraz,سازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences) f nouri pharmaceutical sciences research center, school of pharmacy, shiraz university of medical science, shiraz, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences) m haghani 2ionizing and non-ionizing radiation protection research center (inirprc), shiraz university of medical sciences, shirazسازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences) s a r mortazavi student research committee, school of medicine, shiraz university of medical sciences, shiraz, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شیراز (shiraz university of medical sciences)

background : due to rapid advances in modern technologies such as telecommunication technology, the world has witnessed an exponential growth in the use of digital handheld devices (e.g. smartphones and tablets). this drastic growth has resulted in increased global concerns about the safety of these devices. smartphones, tablets, laptops, and other digital screens emit high levels of short-wave...

2003
Mikko Löytynoja Tapio Seppänen Nedeljko Cvejic

This paper describes an experimental digital rights management architecture which uses digital watermarking and encryption to protect the content. In addition to cryptographically protected media content, the deliverable package can also include a teaser that the user is allowed to consume freely. The content is identified with an attack-resistant watermark that is used to automatically acquire...

Journal: :تحقیقات کتابداری و اطلاع رسانی دانشگاهی 0
یعقوب نوروزی عضو هیأت علمی گروه علم اطلاعات و دانش شناسی دانشگاه قم نیره جعفری فر کارشناس ارشد علم اطلاعات و دانش شناسی دانشگاه قم

objective: in the this research, effective factors on digital libraries’ development in central libraries of public universities in tehran have been identified from these libraries administrator’s view.method: this study is applied, based on descriptive-analytical method. for data collection we used researcher-made questionnaire, based on the digital library federation definition (including hum...

2002
Carl Ellison

This paper contrasts the use of an ID PKI (Public Key Infrastructure) with the use of delegatable, direct authorization. It first addresses some commonly held beliefs about an ID PKI – that you need a good ID certificate to use digital signatures, that the ID certificate should come from a CA that has especially good private key security, that use of the ID certificate allows you to know with w...

1999
Carl A. Gunter

QCM stands for `Query Certi cate Manager'; it is a software system that has been developed at the University of Pennsylvania as part of the SwitchWare project on active networks. QCM is a Public Key Infrastructure (PKI) intended to support secure maintenance of distributed data sets like Access Control Lists (ACL's) or public key certi cate repositories. An ACL is a list of `principals', identi...

2016
Geoff F. Kaufman Mary Flanagan

The present research compared the experiences and outcomes afforded by digital and non-digital games. In a randomized experiment, a sample of youth, ages 11-17, played a cooperative public health game presented in either a non-digital format (board game) or digital format (mobile app). Relative to baseline scores reported in a no-game control condition (N = 30), players of the non-digital versi...

2007
Yanjiang Yang Robert H. Deng Feng Bao

Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do not address user privacy at all, while anonymous credentials that protect user privacy are complex and have compatibility problems with existing PKIs. In this paper we propose privacy-preserving credentials, a concept bet...

1999
Jon Howell David Kotz

In our quest to give users uniform access to resources unimpeded by administrative boundaries, we discovered that we needed transitive sharing among users, with the possibility of restricted access along each sharing link. To achieve that goal, we extend Lampson et al.’s calculus for access control to support restricted delegations. We discuss the advantages of our extension, including the simp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید