نتایج جستجو برای: critical identity

تعداد نتایج: 592808  

Journal: :IJEIS 2005
Alan D. Smith Allen R. Lias

Fraud and identity theft have been increasing with the use of e-commerce. In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves. Organizations that engage in e-commerce as a large part of their business need to protect their customers against th...

2006
Adriana J. Umaña-Taylor Ruchi Bhanot Nana Shin Jorge Ramirez

2011
Michael C Reade Sachin Yende Derek C Angus

Understanding the nature and biological basis of gender-determined differences in risk of and outcome from infection might identify new therapeutic targets, allow more individualised treatment, and facilitate better risk prediction and application of healthcare resources. Gender differences in behaviours, comorbidities, access to healthcare and biology may result in differences in acquiring inf...

2014
Hajer Herbegue Mamoun Filali Hugues Cassé

WCET calculus is nowadays a must for safety critical systems. As a matter of fact, basic real-time properties rely on accurate timings. Although over the last years, substantial progress has been made in order to get a more precise WCET, we believe that the design of the underlying frameworks deserve more attention. In this paper, we are concerned mainly with two aspects which deal with the mod...

2008
Libor Běhounek Martina Daňková

We present a method for mass proofs of theorems of certain forms in a formal theory of fuzzy relations and classes. The method is based on formal identification of fuzzy classes and inner truth values with certain fuzzy relations, which allows transferring basic properties of sup-T and inf-R compositions to a family of more than 30 composition-related operations, including sup-T and inf-R image...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده علوم اقتصادی و سیاسی 1387

چکیده ندارد.

2011
Ali M. Al-Khouri

Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing...

2015
Kal Toth

The growing popularity of mobile apps, the “bring your own device” (BYOD) phenomenon, cloud computing, and big data, seem to have created the perfect storm for traditional identity technologies and solutions. Service providers and certain users too are increasingly aware that the features and benefits offered by an identity solution are worth nothing if a crafty attacker breaks through critical...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید