Results 1 to 10 of about 8,618,364 (391)

Security as a Service [PDF]

open access: bronzeThe Geneva Papers on Risk and Insurance - Issues and Practice, 1978
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
Hans Braunschweiler
openalex   +3 more sources

Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks. [PDF]

open access: yesSensors (Basel), 2017
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the ...
Lin Z, Tao D, Wang Z.
europepmc   +2 more sources

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems. [PDF]

open access: yesSensors (Basel), 2017
Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud,
Wu J, Su Z, Wang S, Li J.
europepmc   +2 more sources

Validating a Web service security abstraction by typing [PDF]

open access: green, 2002
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Andrew D. Gordon, Riccardo Pucella
openalex   +4 more sources

Quality of Security Service: Adaptive Security

open access: green, 2004
Abstract : The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks. In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to
Timothy E. Levin   +2 more
openalex   +6 more sources

Assessing the security of VoIP Services [PDF]

open access: green2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007
VoIP networks are in a major deployment phase and are becoming widely spread out due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality.
Humberto Abdelnur   +3 more
openalex   +7 more sources

Denial of information to the officer of the communal militia, police and security services: Between punishment and non-punishment [PDF]

open access: yesPravni Zapisi, 2022
The paper is dealing with authorities of the comunal militia, police and security services to collect information from citizens and legal persons. While the authorities of police and security services are based on willingness of giving information, at ...
Milosavljević Bogoljub
doaj   +1 more source

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

open access: yesIEEE Transactions on Industrial Informatics, 2022
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa   +3 more
semanticscholar   +1 more source

MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY

open access: yesTechnological and Economic Development of Economy, 2022
Choosing the optimal network security service provider (NSSP) is a very important part of enterprise management decision. And the choice of NSSP is a typical multiple attribute group decision making (MAGDM) issue.
Mengwei Zhao   +4 more
semanticscholar   +1 more source

Impact of prior SARS-CoV-2 infection and COVID-19 vaccination on the subsequent incidence of COVID-19: a multicentre prospective cohort study among UK healthcare workers – the SIREN (Sarscov2 Immunity & REinfection EvaluatioN) study protocol

open access: yesBMJ Open, 2022
Introduction Understanding the effectiveness and durability of protection against SARS-CoV-2 infection conferred by previous infection and COVID-19 is essential to inform ongoing management of the pandemic. This study aims to determine whether prior SARS-
Nick Andrews   +21 more
doaj   +1 more source

Home - About - Disclaimer - Privacy