Results 31 to 40 of about 2,319,668 (347)

Security Issues in a SOA-based Provenance System [PDF]

open access: yes, 2006
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong   +9 more
core   +2 more sources

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Secure OM2M Service Platform [PDF]

open access: yes2015 IEEE International Conference on Autonomic Computing, 2015
Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (
Sicari, Sabrina   +4 more
openaire   +3 more sources

Zaangażowanie, unikanie, odmowa współpracy. Marian Jurczyk wobec Służby Bezpieczeństwa (1977–1980) [PDF]

open access: yesKwartalnik Historyczny
This article discusses the rela tionship of one of the later leaders of the „Solidarity” Trade Union, Marian Jurczyk, with the Security Service, during the 1970s.
Michał Siedziako
doaj   +1 more source

Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2022
Rapid globalization and informatization of everyday processes, mass use of Internet resources and social networks contribute to the uncontrolled spread of disinformation.
A. I. Marushchak, N. O. Kudriavtseva
doaj   +1 more source

Quality of security service

open access: yesProceedings of the 2000 workshop on New security paradigms, 2001
Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources.
Irvine, Cynthia E., Levin, Timothy E.
openaire   +3 more sources

Задача выбора пропускных способностей каналов связи транспортной сети, учитывающая разбалансировку трафика различного приоритета

open access: yesИнформатика и автоматизация, 2020
Предлагается вариант решения задачи выбора пропускных способностей цифровых каналов связи транспортной сети, учитывающий разбалансировку трафика данных по приоритетам.
Sergej Jur'evich Andreev   +2 more
doaj   +1 more source

TO THE 110-TH ANNIVERSARY OF RENIN FINDING. FIGHT OF TITANS: ANGIOTENSIN CONVERTING ENZYME INHIBITORS AND SARTANS

open access: yesРациональная фармакотерапия в кардиологии, 2016
Angiotensin converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARB) slow down progression of cardiovascular diseases and reduce risk of mortality and life threatening complications.
L. N. Malay   +3 more
doaj   +1 more source

Исследование структурных свойств сети Интернет на основе метаграфовых моделей

open access: yesИнформатика и автоматизация, 2020
При исследовании сети Интернет ее структуру разделяют на уровни: уровень автономных систем, уровень точек присутствия операторов связи, уровень оборудования и так далее.
Maxim Vladimirovich Ivanov   +2 more
doaj   +1 more source

Adoption of security as a service [PDF]

open access: yesJournal of Internet Services and Applications, 2013
Security as a Service systems enable new opportunities to compose security infrastructures for information systems. However, to date there are no holistic insights about their adoption and relevant predictors. Based on existing technology acceptance models we developed an extended application-specific research model including formative and reflective ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy