نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :JITR 2015
Sajjad Hashemi Khalil Monfaredi Seyyed Yasser Hashemi

E-government tries to take advantage of new technology to provide better service to citizens. Some of the main challenges in the face of E-government are query processing high volume applications, data center management, data security and E-government services. Cloud computing can be a good option for responding to these issues and fixing them, and guarantee the realization of E-government, wit...

2004
R. WHITE

Absrracr-ABYSS (A Basic Yorktown Security System) is an architecture for protecting the execution of application software. It supports a uniform security service across the range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution chan...

2015
Shenja van der Graaf Wim Vanobberghen Michalis Kanakakis Costas Kalogiros

This paper aims to unravel the intricacies of the mechanisms of trust vis-à-vis ICTs and the contextual logic guiding user deployment and experience, necessitating a view of trust in the digital realm as a dynamic process. Trust models tend to highlight ‘well-placed trust’ in their focus on drawing out (sub)components of (perceived) trustworthiness as attributes of the trusted system or party f...

2002
Ji-Hoon JEONG Geon-Woo KIM So-Hee PARK Sung-Won SOHN

Ipsec is a standard protocol to offer Internet information security service. Recently Ipsec is implemented through out the world on the base of various operating systems. Through the inter-operability test among multiple independent implemented devices, it is now the mandatory function of Internet equipment. Ipsec adds two headers (i.e.,AH & ESP) and protocol to the legacy IP packet so therefor...

Journal: :Kìberbezpeka. osvìta, nauka, tehnìka 2023

The content of the audit and vulnerability testing information telecommunication system (ITS) any enterprise is considered. Based on results security audit, overall company's ITS assessed. It proposed to assess IT using penetration in following areas: from outside inside infrastructure, social engineering personnel for resistance DDoS attacks; assessment mobile application, web resource wireles...

2005
Namje Park Howon Kim Seungjoo Kim Dongho Won

Location-based services or LBS refers to value-added service by processing information utilizing mobile user location. For this kind of LBS, the role of security service is very important in the LBS that store and manage the location information of mobile devices and support various application services using those location information. And in all phases of these functions that include acquisit...

2012
Zichao Yang John C. S. Lui

Hosts (or nodes) in the Internet often face epidemic risks such as virus and worms attack. Despite the awareness of these risks and the availability of anti-virus software, investment in security protection is still scare, hence, epidemic risk is still prevalent. Deciding whether to invest in security protection is an inter-dependent process: security investment decision made by one node can af...

Journal: :Ukrainian Scientific Journal of Information Security 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید