Results 21 to 30 of about 2,383,360 (354)

Criminal law protection of critical infrastructure objects against subversive encroachments

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj   +1 more source

Security Issues in a SOA-based Provenance System [PDF]

open access: yes, 2006
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong   +9 more
core   +2 more sources

Security as a Service [PDF]

open access: yesThe Geneva Papers on Risk and Insurance - Issues and Practice, 1978
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
openaire   +1 more source

Quality of security service

open access: yesProceedings of the 2000 workshop on New security paradigms, 2001
Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources.
Irvine, Cynthia E., Levin, Timothy E.
openaire   +2 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Selection of Candidates for Positions in Higher Education Institution from the Standpoint of Their Potential Loyalty to Employer

open access: yesВысшее образование в России, 2020
The article focuses on the personal characteristics of candidates for employment in higher education institutions. The presence of a number of features in a candidate, with high probability, determines their potential disloyalty to any employer in the ...
A. R. Alaverdov, T. P. Alaverdova
doaj   +1 more source

TO THE 110-TH ANNIVERSARY OF RENIN FINDING. FIGHT OF TITANS: ANGIOTENSIN CONVERTING ENZYME INHIBITORS AND SARTANS

open access: yesРациональная фармакотерапия в кардиологии, 2016
Angiotensin converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARB) slow down progression of cardiovascular diseases and reduce risk of mortality and life threatening complications.
L. N. Malay   +3 more
doaj   +1 more source

CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS

open access: yesВестник университета, 2020
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and ...
M. N. Vlasenko   +2 more
doaj   +1 more source

Security for Grid services

open access: yesHigh Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on, 2004
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches.
Welch, Von   +9 more
openaire   +2 more sources

Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
Rapid globalization and informatization of everyday processes, mass use of Internet resources and social networks contribute to the uncontrolled spread of disinformation.
A. I. Marushchak, N. O. Kudriavtseva
doaj   +1 more source

Home - About - Disclaimer - Privacy