Academic literature on the topic 'Secure Services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Services"

1

Exworthy, Tim. "Secure psychiatric services." Current Opinion in Psychiatry 13, no. 6 (November 2000): 581–85. http://dx.doi.org/10.1097/00001504-200011000-00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Andrea. "High secure services." British Journal of Forensic Practice 7, no. 4 (November 2005): 27–32. http://dx.doi.org/10.1108/14636646200500026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services." International Journal of Electronic Government Research 8, no. 1 (January 2012): 1–25. http://dx.doi.org/10.4018/jegr.2012010101.

Full text
Abstract:
E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.
APA, Harvard, Vancouver, ISO, and other styles
4

Beales, D. "Pendulummanagement in secure services." British Journal of Psychiatry 184, no. 3 (March 2004): 270–71. http://dx.doi.org/10.1192/bjp.184.3.270-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, Nor Azlina Abd. "A Conceptual Diagram for Secure Virtual Office Services." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1251–60. http://dx.doi.org/10.37200/ijpr/v23i4/pr190451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coid, Jeremy, Nadji Kahtan, Simon Gault, Adrian Cook, and Brian Jarman. "Medium secure forensic psychiatry services." British Journal of Psychiatry 178, no. 1 (January 2001): 55–61. http://dx.doi.org/10.1192/bjp.178.1.55.

Full text
Abstract:
BackgroundRegional medium secure developments have proceeded unevenly, with wide variations in resources to deliver services.AimsTo compare patients admitted to seven (pre-reorganisation) regional services and styles of service delivery.MethodA record survey of a complete sample of 2608 patients admitted on 3403 occasions between 1 January 1988 and 31 December 1994.ResultsServices differed according to location of patients before admission, their legal basis for detention, criminal and antisocial behaviour, diagnosis, security needs and length of stay. Regions with more resources and lower demand provided a wider range of services. Thames services were relatively under-provided during the study period, with North East Thames substantially reliant on admissions to private hospitals.ConclusionsUncoordinated development led to under-provision despite high demand. Certain regions prioritised offender patients and did not support local psychiatric services. New standards are required for service specification and resource allocation to redress inequality. Traditional performance measures were of limited usefulness in comparing services.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhargavan, Karthikeyan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. "Secure sessions for Web services." ACM Transactions on Information and System Security 10, no. 2 (May 2007): 8. http://dx.doi.org/10.1145/1237500.1237504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orakwue, Enuma. "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 295–98. http://dx.doi.org/10.1080/19393550903482924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pinto, António, and Manuel Ricardo. "Secure multicast in IPTV services." Computer Networks 54, no. 10 (July 2010): 1531–42. http://dx.doi.org/10.1016/j.comnet.2009.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.

Full text
Abstract:
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Secure Services"

1

Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.

Full text
Abstract:
Graphs are powerful tools for a wide range of real applications, from Biological and Chemical Databases, Social Networks, Citation Networks to Knowledge Bases. Large graph data repositories have been consistently found in recent applications. Due to the high complexity of graph queries, e.g., NP-Completeness of subgraph query, and the lack of IT expertise, hosting efficient graph query services for the owners of graph data has been a technically challenging task. And hence, they may prefer to outsource their services to third-party service providers (SPs) for scalability, elasticity and efficiency. Unfortunately, SPs may not always be trusted. Security, typically the integrity and confidentiality, of the data, has been recognized as one of the critical attributes of Quality of Services (QoS). This directly influences the willingness of both data owners and query clients to use SP’s services. To address these concerns, this thesis proposes novel techniques to solve both authentication-aware and privacy-aware subgraph query. Firstly, we study authenticated subgraph query services (Chapter 3). To support the service, we propose Merkle IFTree (MIFTree) where Merkle hash trees are applied into our Intersection-aware Feature-subgraph Tree (IFTree). IFTree aims to minimize I/O in a well-received subgraph query paradigm namely the filtering-and-verification framework. The structures required to be introduced to verification objects (VOs) and the authentication time are minimized. Subsequently, the overall response time is minimized. For optimizations, we propose an enhanced authentication method on MIFTree. Secondly, we propose structure-preserving subgraph query services (Chapter 4). A crucial step of this part is to transform the seminal subgraph isomorphism algorithm (the Ullmann’s algorithm) into a series of matrix operations. We propose a novel cyclic group based encryption (CGBE) method for private matrix operations. We propose a protocol that involves the query client and static indexes for optimizations. We prove that the structural information of both query graph and data graph are preserved under CGBE and analyze the privacy preservation in the presence of the optimizations. Thirdly, we propose asymmetric structure-preserving subgraph query processing (Chapter 5), where the data graph is publicly known and the query structure/topology is kept secret. Unlike other previous methods for subgraph queries, this part proposes a series of novel optimizations that only exploit graph structures, not the queries. Further, we propose a robust query encoding and adopt our proposed cyclic group based encryption method, so that the query processing can be transformed into a series of private matrix operations and performed securely. The effectiveness and efficiency of all the techniques presented in this thesis are experimentally evaluated with both real-world and synthetic dataset
APA, Harvard, Vancouver, ISO, and other styles
2

Ali, Mazhar. "Towards Secure Cloud Storage Services." Diss., North Dakota State University, 2015. http://hdl.handle.net/10365/24802.

Full text
Abstract:
Cloud computing is anticipated to revolutionize the Information and Communication Technology sector and has been a mainstream of research over the last decade. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their data, applications and services to the cloud. However, the services provided by third-party cloud service providers entail additional security threats. Data being one of the prime assets of the organizations must be protected from all sorts of security threats. The data in the cloud is much more vulnerable to risks in terms of confidentiality, integrity, and availability in comparison to the conventional computing model. The ever increasing number of users and applications leads to enhanced security risks. Violation of integrity may also result from multi-tenant nature of the cloud. Employee of SaaS providers, having access to information may also act as a potential risk. Considering the paramount importance of data security in the cloud environment, we propose methodologies towards the secure cloud storage services. We propose methodologies to secure: (a) Single user data, (b) Group shared data, and (c) approach security and performance collectively. We propose Data Security for Cloud Environment with Semi-trusted third party (DaSCE) protocol, a cloud storage security system that provide key management, access control, and file assured deletion. Parts of keys are stored at semi-trusted servers called key managers. The key management is accomplished using (k, n) threshold secret sharing mechanism. Finally, we present the DROPS methodology that collectively deals with the security and performance in terms of retrieval time. The data file is fragmented and the fragments are dispersed over multiple nodes. The nodes are separated by means of T-coloring. The fragmentation and dispersal ensures that no significant information is obtainable by an adversary in case of a successful attack.
APA, Harvard, Vancouver, ISO, and other styles
3

Hines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.

Full text
Abstract:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California
One of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.

Full text
Abstract:

Sensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.

In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communications in the neighborhood of the network. Our goal is to generate extra traffic in an intelligent way so that it can effectively mask user activity without draining the energy from the sensors.

APA, Harvard, Vancouver, ISO, and other styles
6

Hayton, Richard. "An open architecture for secure interworking services." Thesis, University of Cambridge, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Potebenko, Maria, and Alina Shliakhovska. "Secure environment for e-services in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51120.

Full text
Abstract:
1. Services & Specialties - E-services [Electronic resource]. – Access mode: https://sites.google.com/a/sharadarupasinghe.com/e-services/services 2. Electronic services by categories | Cabinet Ministers of Ukraine (in Ukrainian) [Electronic resource]. – Access mode: https://www.kmu.gov.ua/servicesfilter 3. Current state, problems and prospects for the development of electronic administrative services in Ukraine (in Ukrainian) [Electronic resource]. – Access mode: https://niss.gov.ua/doslidzhennya/politika/suchasniy-stan-problemi-i-perspektivi-rozvitku-vukraini-elektronnikh
The concept of e-service represents one prominent application of utilizing the use of information and communication technologies in different areas. Basically, there are three main components: service provider, service receiver and the channels of service delivery. For example, as concerned to public e-service, public agencies are the service provider and citizens as well as businesses are the service receiver. The channel of service delivery is the third requirement of e-service. Internet is the main channel of e-service delivery while other classic channels are also considered.
Концепція електронного сервісу являє собою одне з видатних застосувань використання інформаційно-комунікаційних технологій у різних сферах. В основному, є три основні компоненти: постачальник послуг, приймач послуг та канали надання послуг. Наприклад, що стосується державної електронної послуги, державні установи є постачальником послуг, а громадяни, а також підприємства - отримувачами послуг. Канал надання послуг є третьою вимогою електронної послуги. Інтернет є основним каналом надання електронних послуг, тоді як інші класичні канали також розглядаються.
APA, Harvard, Vancouver, ISO, and other styles
8

Barnes, Cheontell Marie. "Relating following aggression : women's medium secure services." Thesis, University of Essex, 2015. http://repository.essex.ac.uk/16837/.

Full text
Abstract:
Background: Women in medium secure services can present with aggressive behaviours and a high level of risk to self and others. Research suggests frontline staff are frequently the victims of, or witness to aggression by forensic inpatients. The therapeutic relationship is proposed as central to therapeutic outcome, but may be jeopardised by inpatient aggression. Staff perceptions of the therapeutic relationship and aggression have not been explored in women’s medium secure services. The study aimed to develop a theoretical model grounded in frontline staff perceptions of the therapeutic alliance and aggression in a women’s medium secure services. Method: The data from 13 semi-structured interviews conducted with frontline staff was analysed using Constructivist Grounded Theory methods. Results: The tentative descriptive theoretical model “Relating Following Aggression” emerged from the interview data. Contextual information supports five core categories, and the related sub-categories. The findings propose the therapeutic relationship is intrinsically linked to boundaries, and boundary violations could result in relational deterioration. Aggression affected the emotional and psychological wellbeing of the participants, and compromised the staff-patient relationship. The participants were fearful of aggression occurring in their workplace which resulted in them spending less time with the women and withdrawing from the therapeutic relationship. Conclusion: The findings reveal the complexity of the frontline staff-patient relationship in women’s services. Aggression occurring between frontline staff and women can seriously compromise the therapeutic relationship through a crossing of the boundary line and a perceived breach of trust. Greater support for both the frontline staff and women is required. Future research is recommended. Keywords: Frontline staff, women, aggression, forensic, therapeutic relationship, Constructivist Grounded Theory.
APA, Harvard, Vancouver, ISO, and other styles
9

Krohn, Maxwell (Maxwell N. ). "Building fast and secure Web services with OKWS." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34364.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 69-74).
OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS's throughput and responsiveness exceed that of Apache 2, Flash and Haboob. Experience with OKWS in a commercial deployment suggests it can reduce hardware and system management costs, while providing security guarantees absent in current systems. In the end, lessons gleaned from the OKWS project provide insight into how operating systems might better facilitate secure application design.
by Maxwell Krohn.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Hong Ping. "Secure proximity queries in mobile geo-social services." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_ra/1551.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Secure Services"

1

Arvind, Durai, ed. Cisco secure firewall services module (FWSM). Indianapolis, IN: Cisco Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scalable and secure internet services and architecture. Boca Raton, Fla: Chapman & Hall/CRC, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heisel, Maritta, Wouter Joosen, Javier Lopez, and Fabio Martinelli, eds. Engineering Secure Future Internet Services and Systems. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07452-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ricard, Sarff, ed. EMS for secure facilities. Australia: Delmar Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Health, Great Britain Department of. Secure accommodation: Guidance and regulations. London: Department of Health, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Agency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Acharjya, D. P., and B. K. Tripathy. Advances in secure computing, internet services, and applications. Hershey, PA: Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Psychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harvey, Joel. Psychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure Services"

1

Kalliola, Aapo, Tuomas Aura, and Sanja Šćepanović. "Denial-of-Service Mitigation for Internet Services." In Secure IT Systems, 213–28. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leitold, Herbert, Karl Christian Posch, and Reinhard Posch. "ISDN Security Services." In Secure Information Networks, 21–35. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Secure Publishing Techniques." In Security for Web Services and Service-Oriented Architectures, 147–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohanty, Vakul, and Chittaranjan Hota. "Secure Web Services Negotiation." In Communications in Computer and Information Science, 609–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Basile, Davide, Pierpaolo Degano, and Gian-Luigi Ferrari. "Secure and Unfailing Services." In Lecture Notes in Computer Science, 167–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39958-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baker, Matthew. "Installing and Configuring Services." In Secure Web Application Development, 95–161. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

de Balthasar, Thibault, and Julio Hernandez-Castro. "An Analysis of Bitcoin Laundry Services." In Secure IT Systems, 297–312. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Hongyu, and Panos Papadimitratos. "Resilient Collaborative Privacy for Location-Based Services." In Secure IT Systems, 47–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tschudin, Christian. "Apoptosis — the Programmed Death of Distributed Services." In Secure Internet Programming, 253–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shah, Vikas S. "Blockchain Driven Three Domain Secure 2.x in Digital Payment Services Architecture." In Services – SERVICES 2020, 11–27. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59595-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Services"

1

Yun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pino, Luca, and George Spanoudakis. "Constructing Secure Service Compositions with Patterns." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Zhixiong, and John Yoon. "IT Auditing to Assure a Secure Cloud Computing." In 2010 IEEE Congress on Services (SERVICES). IEEE, 2010. http://dx.doi.org/10.1109/services.2010.118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lim, Yu-xi, and Henry Owen. "Secure wireless location services." In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wetzel, S. "Session details: Secure services." In WiSE04: 2004 ACM Workshop on Wireless Security ( co-located with Mobicom 2004 Conference ). New York, NY, USA: ACM, 2004. http://dx.doi.org/10.1145/3259527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dean, Daniel J., Rohit Ranchal, Yu Gu, Anca Sailer, Shakil Khan, Kirk Beaty, Senthil Bakthavachalam, Yichong Yu, Yaoping Ruan, and Paul Bastide. "Engineering Scalable, Secure, Multi-Tenant Cloud for Healthcare Data." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Horrow, Susmita, Sanchika Gupta, Anjali Sardana, and Ajith Abraham. "Secure Private Cloud Architecture for Mobile Infrastructure as a Service." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maule, R. William. "SoaML and UPIA Model Integration for Secure Distributed SOA Clouds." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Laranjeiro, Nuno, Pedro Furtado, and Marco Vieira. "IEEE International Workshop on Dependable and Secure Services (DSS 2014)." In 2014 IEEE World Congress on Services (SERVICES). IEEE, 2014. http://dx.doi.org/10.1109/services.2014.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Woo, Sungpil, Jaehee Ha, Jaewook Byun, Kiwoong Kwon, Yalew Tolcha, Daeyoun Kang, Hoang Minh Nguyen, Myungchul Kim, and Daeyoung Kim. "Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure Services"

1

Keromytis, Angelos D., Vishal Misra, and Dan Rubenstein. Secure Overlay Services (SOS). Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada426757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ali, Alee Rizwan, and Brye Ann Steeves. Secure Information Services (WRS-SIS). Office of Scientific and Technical Information (OSTI), May 2020. http://dx.doi.org/10.2172/1631547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singhal, A., T. Winograd, and K. A. Scarfone. Guide to secure web services. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brodsky, Micah, Petros Efstathopoulos, Frans Kaashoek, Eddie Kohier, Maxwell Krohn, David Mazieres, Robert Morris, Steve VanDeBogart, and Alexander Yip. Toward Secure Services from Untrusted Developers. Fort Belvoir, VA: Defense Technical Information Center, August 2007. http://dx.doi.org/10.21236/ada477317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Slätmo, Elin, Ágúst Bogason, Anna Vasilevskaya, and Hilma Salonen. Essential rural services in the Nordic Region – Challenges and opportunities. Nordregio, March 2022. http://dx.doi.org/10.6027/r2022:1.1403-2503.

Full text
Abstract:
The objective of this knowledge overview of the project “Service provision and access to services in Nordic rural areas – secure, trusted and for all ages” is to analyse how essential service needs for different types of societal groups and ruralities can be understood and defined, and how solutions to rural service provision challenges can be organised.
APA, Harvard, Vancouver, ISO, and other styles
6

Shaw, Liz, Michael Nunns, Simon Briscoe, Amelia Mosley, Daniel Dalton, Rob Anderson, and Jo Thompson Coon. Evidence for specialist treatment of people with acquired brain injury in secure psychiatric services: systematic review and narrative synthesis. NIHR, August 2020. http://dx.doi.org/10.3310/hsdr-tr-130320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calatayud, Agustina, and Paul Constance. A roadmap to the mobility and logistics trends that are reshaping Latin America and the Caribbean. Inter-American Development Bank, August 2022. http://dx.doi.org/10.18235/0004413.

Full text
Abstract:
Today, governments are acutely aware that merely building new infrastructure is not the solution, and they are seeking the IDB Groups assistance in designing smarter transportation services that will meet their peoples expectations. This document describes the five broad shifts that are driving the IDB Groups transportation portfolio: (i) the social dimension of transportation services; (ii) new institutional and regulatory arrangements; (iii) logistics performance; (iv) secure resources for maintaining transport infrastructure, and (v) the digital transformation.
APA, Harvard, Vancouver, ISO, and other styles
8

Hoffman, P. SMTP Service Extension for Secure SMTP over TLS. RFC Editor, January 1999. http://dx.doi.org/10.17487/rfc2487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Reiter, Michael, and Kenneth Birman. How to Securely Replicate Services. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada252952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chandramouli, Ramaswamy, and Zack Butcher. Building secure microservices-based applications using service-mesh architecture. Gaithersburg, MD: National Institute of Standards and Technology, May 2020. http://dx.doi.org/10.6028/nist.sp.800-204a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography