Results 11 to 20 of about 2,319,668 (347)
Validating a Web service security abstraction by typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Andrew D. Gordon, Riccardo Pucella
openalex +4 more sources
BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova +1 more
doaj +1 more source
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval +5 more
doaj +1 more source
A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils +4 more
openaire +3 more sources
Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich +4 more
doaj +1 more source
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets +2 more
doaj +1 more source
Performance Verification of SeqType® P52 Human Ancestry Identification SNP Detection Kit [PDF]
Objective To evaluate the discrimination efficiency of the SeqType P52 Human Ancestry Identification SNP Detection Kit based on a high-throughput sequencing platform in five Chinese ethnic groups.
WANG Ying-xi, MA Yuan, LI Fu, et al.
doaj +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source
Specificities of non-intelligence work of modern security services [PDF]
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception.
Labović Dejan R. +2 more
doaj +1 more source

