Results 11 to 20 of about 2,319,668 (347)

Validating a Web service security abstraction by typing [PDF]

open access: green, 2002
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Andrew D. Gordon, Riccardo Pucella
openalex   +4 more sources

BIBLICAL IMAGES-SYMBOLS IN FRANK PERETTI’S MYSTICAL THRILLERS: LINGUAL REPRESENTATION AND PRAGMATIC VALUE [PDF]

open access: yesВісник університету ім. А. Нобеля. Серія Філологічні науки, 2023
The paper aims to clarify the biblical image-symbols in Frank Peretti’s mystical thrillers. The problem of the detailed analysis of the lingual representation of the biblical image-symbols and their pragmatic value is solved in the article by applying ...
Polina S. Khabotniakova   +1 more
doaj   +1 more source

Critical appraisal in rapid systematic reviews of COVID-19 studies: implementation of the Quality Criteria Checklist (QCC)

open access: yesSystematic Reviews, 2023
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval   +5 more
doaj   +1 more source

A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]

open access: yes2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 2021
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils   +4 more
openaire   +3 more sources

Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection

open access: yesAge of Human Rights Journal, 2022
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich   +4 more
doaj   +1 more source

Problems of building consolidated corporation strategies for corporate information security management in the EMEA region

open access: yesВісник Харківського національного університету імені В.Н. Каразіна: Серія Міжнародні відносини, економіка, країнознавство, туризм, 2021
The problems of development and construction of a universal consolidated strategy of interaction of IT services and information security, which is based on the study and in-depth analysis of statistics on the current situation with the interaction of ...
Serhii Lubenets   +2 more
doaj   +1 more source

Performance Verification of SeqType® P52 Human Ancestry Identification SNP Detection Kit [PDF]

open access: yesFayixue Zazhi, 2021
Objective To evaluate the discrimination efficiency of the SeqType􀳏 P52 Human Ancestry Identification SNP Detection Kit based on a high-throughput sequencing platform in five Chinese ethnic groups.
WANG Ying-xi, MA Yuan, LI Fu, et al.
doaj   +1 more source

SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core   +1 more source

An architecture for certification-aware service discovery [PDF]

open access: yes, 2011
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core   +1 more source

Specificities of non-intelligence work of modern security services [PDF]

open access: yesBaština
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception.
Labović Dejan R.   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy