Results 61 to 70 of about 6,416 (199)
Corporate social responsibility is neccessity to every corporate. Islamic banking is requirement every shariah bank to doing social services in human resource development and contribution donation with care and maintenance environment.
Ahmad Roziq, Ibnu Aburizal N MS
doaj +1 more source
Gestion contextualisée de la sécurité : implémentation MDS@Runtime avec FraSCAti [PDF]
National audienceThe development of security policies for information systems is usually based on a systematic risks analysis, reducing them by adopting appropriate countermeasures.
Biennier, Frédérique +2 more
core +1 more source
Isolation and Characterization of Stigmasterol from Fritillaria roylei
Fritillaria roylei (Kshirakakoli) is the threatened species of “Ashtwarga” group suffers lot of confusion for identification & authentification in Ayurvedic system of medicine. Due to lack of natural sources and insufficient availability of kshirakakoli,
Gunpreet Kaur +3 more
doaj +1 more source
In the article the author presents the analysis of techniques to ensure users’ anonymity in distributed information systems. We consider requirements for anonymous authentification systems and suggest a new protocol providing full anonymity both for ...
М. В. Дубовицкая
doaj
Le limonène dans les huiles essentielles : énantiomères et activités biologiques
Literature data are used to identify the enantiomeric diversity of limonene in 54 essential oils composed of between 0.3–99.7% of this molecule. Significant enantiomeric excesses are observed, either in (R)-(+)-, or in (S)-(–)-limonene, and more rarely ...
Aribi-Zouioueche, Louisa
doaj +1 more source
Codex Alimentarius Standard, EU Legislation and National Standards state honey authenticity. Authenticity in respect of production (to prevent adulteration) and authenticity in respect of geographical and botanical origin are the two main aspects of ...
Liviu Alexandru MARGHITAS +5 more
doaj +1 more source
CONCEPT OF CORPORATE INFORMATION SYSTEMS WITH CLOUDING COMPUTING AND ITS INFORMATION SECURITY
Concept of integration corporate information systems (ICIS) with clouding computing (CC) is represented. Variants such ICIS are shown. Main problems of information security (IS) in CC area and mechanism of authentification are analyzed.
U. A. Vishniakou +2 more
doaj
Les consommateurs sont demandeurs d’informations et de garanties sur les conditions d’élevage des animaux et en particulier sur leur alimentation. Ces préoccupations conduisent les filières animales à prendre des engagements sur les conditions d’élevage
S. PRACHE +9 more
doaj +1 more source
Three typological approaches to Catalonian archival evidence, 10-12 centuries
[fr] Cet article tripartite s'inspire de la survivance d'un grand nombre de documents catalans des Xe-XIIe siècles. Il rassemble les conclusions partielles de trois recherches de doctorat menées à partir d'un grande nombre d'actes d'un seul type ...
Pere Benito i Monclús +2 more
doaj +1 more source
Cette synthèse fait le point des connaissances sur les différentes dimensions de la qualité des produits issus d’élevages en agriculture biologique (AB) vs conventionnelle et sur les méthodes développées pour les authentifier.
Sophie PRACHE +11 more
doaj +1 more source

