Results 311 to 320 of about 2,411,901 (357)
Evaluating the impact of a full-service mobile food market on food security, diet quality and food purchases: a cluster randomised trial protocol and design paper. [PDF]
Horning ML+6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The State of Public Infrastructure-as-a-Service Cloud Security
ACM Computing Surveys, 2015The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, we find some of the security mechanisms offered by the services to be similar, indicating that the cloud industry has established a number of “best ...
David Lie+4 more
openaire +2 more sources
A Stateful Web Service with Scalable Security on HVEM DataGrid
Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007), 2007Web Service has its characteristic of statelessness. But, many applications on Grid need the stateful services. The advanced search on HVEM DataGrid is one example. The search service provides a multi-depth search and an associated search. The service should trace the search states and provide the access control as well as the service security in the ...
In Soon Cho+4 more
openaire +2 more sources
Private security services regulations in the United States today
International Journal of Comparative and Applied Criminal Justice, 2017Security services regulations in the United States began formally in the second half of the twentieth century.
openaire +2 more sources
Security-aware web service composition approaches
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, 2011Nowadays service composition has been received lots of attentions considering the fact that no single service can satisfy users' desires in the majority of service oriented scenarios. In this respects, many enterprises decides to integrate their services and applications to fulfill required goals by service consumers.
Homa Movahednejad+4 more
openaire +2 more sources
Huawei Technologies’ Links to Chinese State Security Services
SSRN Electronic Journal, 2019Using a unique dataset of CVs, this paper analyzes the relationship between key Huawei personnel and the Chinese state security services. Based upon an analysis of this dataset, I find there is strong evidence that Huawei personnel act at the direction of Chinese state intelligence, and that there exists a deep and lasting relationship between Huawei ...
openaire +2 more sources
The Absent State: Failures of the Judicial System, Dependent and Corrupted Courts, Police and Security Services [PDF]
In this chapter we are addressing the numerous cases of government failures in countries with transit economies and weak democratic traditions when the state is called upon to provide “pure public goods” (defense, security, and justice). In other words, the subject matter of this chapter involves those institutions which create the very possibility of ...
Sergei Zhavoronkov+3 more
openaire +2 more sources