نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
E-government tries to take advantage of new technology to provide better service to citizens. Some of the main challenges in the face of E-government are query processing high volume applications, data center management, data security and E-government services. Cloud computing can be a good option for responding to these issues and fixing them, and guarantee the realization of E-government, wit...
Absrracr-ABYSS (A Basic Yorktown Security System) is an architecture for protecting the execution of application software. It supports a uniform security service across the range of computing systems. The use of ABYSS discussed in this paper is oriented towards solving the software protection problem, especially in the lower end of the market. Both current and planned software distribution chan...
This paper aims to unravel the intricacies of the mechanisms of trust vis-à-vis ICTs and the contextual logic guiding user deployment and experience, necessitating a view of trust in the digital realm as a dynamic process. Trust models tend to highlight ‘well-placed trust’ in their focus on drawing out (sub)components of (perceived) trustworthiness as attributes of the trusted system or party f...
Ipsec is a standard protocol to offer Internet information security service. Recently Ipsec is implemented through out the world on the base of various operating systems. Through the inter-operability test among multiple independent implemented devices, it is now the mandatory function of Internet equipment. Ipsec adds two headers (i.e.,AH & ESP) and protocol to the legacy IP packet so therefor...
The content of the audit and vulnerability testing information telecommunication system (ITS) any enterprise is considered. Based on results security audit, overall company's ITS assessed. It proposed to assess IT using penetration in following areas: from outside inside infrastructure, social engineering personnel for resistance DDoS attacks; assessment mobile application, web resource wireles...
Location-based services or LBS refers to value-added service by processing information utilizing mobile user location. For this kind of LBS, the role of security service is very important in the LBS that store and manage the location information of mobile devices and support various application services using those location information. And in all phases of these functions that include acquisit...
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worms attack. Despite the awareness of these risks and the availability of anti-virus software, investment in security protection is still scare, hence, epidemic risk is still prevalent. Deciding whether to invest in security protection is an inter-dependent process: security investment decision made by one node can af...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید