Results 1 to 10 of about 8,618,364 (391)
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
Hans Braunschweiler
openalex +3 more sources
Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks. [PDF]
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the ...
Lin Z, Tao D, Wang Z.
europepmc +2 more sources
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems. [PDF]
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud,
Wu J, Su Z, Wang S, Li J.
europepmc +2 more sources
Validating a Web service security abstraction by typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Andrew D. Gordon, Riccardo Pucella
openalex +4 more sources
Quality of Security Service: Adaptive Security
Abstract : The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to
Timothy E. Levin+2 more
openalex +6 more sources
Assessing the security of VoIP Services [PDF]
VoIP networks are in a major deployment phase and are becoming widely spread out due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality.
Humberto Abdelnur+3 more
openalex +7 more sources
Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj +1 more source
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa+3 more
semanticscholar +1 more source
Choosing the optimal network security service provider (NSSP) is a very important part of enterprise management decision. And the choice of NSSP is a typical multiple attribute group decision making (MAGDM) issue.
Mengwei Zhao+4 more
semanticscholar +1 more source
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews+21 more
doaj +1 more source