نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Journal: :International Journal of Engineering & Technology 2018

2002
Márcio Aurélio Ribeiro Moreira João Nunes Souza Ilmério Reis da Silva

We propose a multi-user key and data exchange protocol, which is able to manipulate stored encrypted data without need to decipher. This protocol can be used by several clients at any given time, which are connected to a server, for keys and data exchanges. The ciphered data located in client and that located in the server is exchanged, stored, compared and processed without the need to deciphe...

Journal: :مدیریت اطلاعات سلامت 0
محترم نعمت الهی استادیار، مدیریت اطلاعات بهداشتی درمانی، دانشگاه علوم پزشکی شیراز، شیراز، ایران ناهید حاتم دانشیار، مدیریت خدمات بهداشتی درمانی، دانشگاه علوم پزشکی شیراز، شیراز، ایران

introduction: voluntary counseling and testing (vct) for hiv infection is a confidential service offered to individuals in the community. this study intended to present a pattern for regional surveillance of vct services in iran. methods: this was an applied descriptive study. at first, the existing regional vct surveillance in 2009 was investigated through visiting the clinical deputy of medic...

Background and objective: The covid-19 pandemic, one of the complex situations with high uncertainty in decision-making, has faced a crisis in socio-economic systems for more than two years. Municipalities are considered as key crisis management organizations due to the wide variety of services they provide to citizens. The current research, by designing a soft system intervention, has develope...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

Journal: :Journal of Computer Security 2006
Arun K. Eamani A. Prasad Sistla

SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource access is distributively specified by multiple trusted entities. Agents in the system need a formal mechanism for understanding the current state of policy. We present a first order temporal logic, called FTPL for specifying propert...

Journal: :Future Internet 2017
Sofia-Anna Menesidou Vasilios Katos Georgios Kambourakis

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is th...

2010
Mathias Björkqvist Christian Cachin Robert Haas Xiao-Yu Hu Anil Kurmus René Pawlitzek Marko Vukolic

Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed comprehensively so far. First, KLMS introduces a pattern-based method to simplify and to automate the deployment task for keys and certificates, i.e., the task of associating them with endpoints that use them. Currently,...

Journal: :مدیریت دولتی 0
رضا طهماسبی استادیار گروه منابع انسانی دانشکدة مدیریت پردیس فارابی دانشگاه تهران، تهران، ایران آرین قلی پور استاد گروه منابع انسانی دانشکدة مدیریت دانشگاه تهران، تهران، ایران محمد صادق ضیائی استاد گروه مدیریت دولتی دانشکدة مدیریت دانشگاه تهران، تهران، ایران حسن قالیباف اصل استادیار گروه مدیریت دانشکدة علوم اجتماعی و اقتصادی دانشگاه الزهرا (س)، تهران، ایران

this research aims to develop a theory of talent management. the research method is qualitative based on grounded theory. data were gathered in investment market as theoric sampling and 16 interviews were done by managers of investment market. the results of open, axial and selective coding lead to develop dual-core hr architecture theory. based on this theory, organizations should differentiat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید