Journal articles on the topic 'Secure Services'

To see the other types of publications on this topic, follow the link: Secure Services.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure Services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Exworthy, Tim. "Secure psychiatric services." Current Opinion in Psychiatry 13, no. 6 (November 2000): 581–85. http://dx.doi.org/10.1097/00001504-200011000-00019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Andrea. "High secure services." British Journal of Forensic Practice 7, no. 4 (November 2005): 27–32. http://dx.doi.org/10.1108/14636646200500026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services." International Journal of Electronic Government Research 8, no. 1 (January 2012): 1–25. http://dx.doi.org/10.4018/jegr.2012010101.

Full text
Abstract:
E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.
APA, Harvard, Vancouver, ISO, and other styles
4

Beales, D. "Pendulummanagement in secure services." British Journal of Psychiatry 184, no. 3 (March 2004): 270–71. http://dx.doi.org/10.1192/bjp.184.3.270-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, Nor Azlina Abd. "A Conceptual Diagram for Secure Virtual Office Services." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1251–60. http://dx.doi.org/10.37200/ijpr/v23i4/pr190451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coid, Jeremy, Nadji Kahtan, Simon Gault, Adrian Cook, and Brian Jarman. "Medium secure forensic psychiatry services." British Journal of Psychiatry 178, no. 1 (January 2001): 55–61. http://dx.doi.org/10.1192/bjp.178.1.55.

Full text
Abstract:
BackgroundRegional medium secure developments have proceeded unevenly, with wide variations in resources to deliver services.AimsTo compare patients admitted to seven (pre-reorganisation) regional services and styles of service delivery.MethodA record survey of a complete sample of 2608 patients admitted on 3403 occasions between 1 January 1988 and 31 December 1994.ResultsServices differed according to location of patients before admission, their legal basis for detention, criminal and antisocial behaviour, diagnosis, security needs and length of stay. Regions with more resources and lower demand provided a wider range of services. Thames services were relatively under-provided during the study period, with North East Thames substantially reliant on admissions to private hospitals.ConclusionsUncoordinated development led to under-provision despite high demand. Certain regions prioritised offender patients and did not support local psychiatric services. New standards are required for service specification and resource allocation to redress inequality. Traditional performance measures were of limited usefulness in comparing services.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhargavan, Karthikeyan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. "Secure sessions for Web services." ACM Transactions on Information and System Security 10, no. 2 (May 2007): 8. http://dx.doi.org/10.1145/1237500.1237504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orakwue, Enuma. "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 295–98. http://dx.doi.org/10.1080/19393550903482924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pinto, António, and Manuel Ricardo. "Secure multicast in IPTV services." Computer Networks 54, no. 10 (July 2010): 1531–42. http://dx.doi.org/10.1016/j.comnet.2009.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.

Full text
Abstract:
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Sung-Ki, Jin-Chul Jung, Kyung-No Park, and Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States." KIPS Transactions:PartC 15C, no. 3 (June 30, 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hall, Ian, Evan Yacoub, Neil Boast, Robert Bates, Rebekah Stamps, Sarah Holder, and Matthew Beadman. "Secure inpatient services: a needs assessment." Journal of Intellectual Disabilities and Offending Behaviour 5, no. 1 (March 4, 2014): 38–53. http://dx.doi.org/10.1108/jidob-09-2013-0023.

Full text
Abstract:
Purpose – The purpose of this paper is to complete a thorough needs assessment that would enable the development of a robust pathway of care for adults with a learning disability requiring secure care, and to assist commissioners to make informed planning decisions. Design/methodology/approach – The paper identified people with a learning disability originating from London who were in secure care, and collected data about them. The paper used reference groups to inform the analysis. Findings – The paper identified 249 people in secure services and was able to include 136 patients in the analysis. In all, 64 were in NHS provision and 72 in independent sector provision; 109 (80.1 per cent) were male and 27 (19.9 per cent) female; on average, patients were cared for 61.5 miles away from their homes; NHS patients were far closer to home; 69.1 per cent had a mild learning disability; 82.3 per cent had a history of violence; approximately one in six patients could not progress due to a lack of an appropriate ward, facility, resource and/or intervention. Practical implications – Secure care for this population is a major public health issue. Many are placed a long way from home. Local services should be developed, and there should be sufficiently robust “step down” places for patients to be discharged to. Originality/value – Systematic identification of the needs of a marginalised group to enable better more appropriate care pathways to be developed in the future.
APA, Harvard, Vancouver, ISO, and other styles
13

Hanlon, Jeffrey W. "Watershed Protection to Secure Ecosystem Services." Case Studies in the Environment 1, no. 1 (2017): 1–6. http://dx.doi.org/10.1525/cse.2017.sc.400879.

Full text
Abstract:
In 1997, New York City and a group of smaller municipalities in the Catskills region of New York came to agree upon a novel and complex means of protecting water quality in the City's upstate reservoirs. The Memorandum of Agreement they authored tied previously uncooperating governments to a new shared goal: preserve the ecological integrity of the Catskill and Delaware watersheds so that the City could avoid chemically filtering its municipal water. The agreement represents a policy experiment in reaction to a stark choice. The U.S. Environmental Protection Agency's 1986 Surface Water Treatment Rule mandated that the City either filter its surface water supply or maintain a watershed control program to ensure the long-term protection of water quality in its source watersheds. The City decided to pursue a watershed control program in lieu of the more expensive filtration. The choice has led to a governing arrangement that has theoretical implications for how to simultaneously secure ecosystem services, promote rural livelihoods, and produce the critical public good of potable water to millions of people. The policy solution displays how cooperative institutions may provide low-cost and low-tech solutions to environmental dilemmas to protect ecosystem services. However, over time, governing entities have faced challenges that raise questions about the durability of the arrangement. This case study explores those challenges to better elucidate the possibilities and pitfalls of watershed governance to secure ecosystem services.
APA, Harvard, Vancouver, ISO, and other styles
14

Bacon, Jean, and Ken Moody. "Toward open, secure, widely distributed services." Communications of the ACM 45, no. 6 (June 2002): 59–64. http://dx.doi.org/10.1145/508448.508475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Thomas, Stuart D. M., Mairead Dolan, Jenny Shaw, Samantha Thomas, Graham Thornicroft, and Morven Leese. "Redeveloping Secure Psychiatric Services for Women." Medicine, Science and the Law 45, no. 4 (October 2005): 331–39. http://dx.doi.org/10.1258/rsmmsl.45.4.331.

Full text
Abstract:
Historically, a substantial proportion of women have been unduly detained in conditions of high security in England due to the lack of suitable alternative facilities. There have been no studies that have comprehensively examined the individual needs of these women in relation to their placement needs. A cross sectional survey was undertaken of the individual and placement needs of all females detained in the three high security psychiatric hospitals (HSPHs) in England on 18th October 1999. Whilst there are clearly differences in accommodation needs among the women, those requiring lower secure services are significantly less likely to have needs in relation to violence (OR 0.29, 95% CI 0.14-0.62) and drugs (OR 0.29, 95% CI 0.12-0.67) when length of stay is taken into account. They also have lower security, treatment and dependency needs than women still requiring HSPH treatment. A significant reorganisation of services is required. There is a need to gain further understanding of the relationships between traumatic histories, clinical presentation and antisocial behaviour and how these impact on assessed risk, treatment and care needs and outcome. The special needs of these women should be considered a priority when developing treatment and care packages.
APA, Harvard, Vancouver, ISO, and other styles
16

Fabian, Benjamin, Steffen Kunz, Sebastian Müller, and Oliver Günther. "Secure federation of semantic information services." Decision Support Systems 55, no. 1 (April 2013): 385–98. http://dx.doi.org/10.1016/j.dss.2012.05.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tarkoma, Sasu, Jani Heikkinen, and Mikko Pohja. "Secure push for mobile airline services." Telecommunication Systems 35, no. 3-4 (September 12, 2007): 177–87. http://dx.doi.org/10.1007/s11235-007-9048-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Robins, Bill. "How Secure are Mobile Payment Services?" ITNOW 58, no. 2 (May 16, 2016): 34–35. http://dx.doi.org/10.1093/itnow/bww045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rantos, Konstantinos, Yorgos Katsikogiannis, Andreas Papadakis, and Antonis Ch Stasis. "Secure e-government services across EU." International Journal of Electronic Governance 6, no. 2 (2013): 117. http://dx.doi.org/10.1504/ijeg.2013.058362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bartlett, Annie, and Yonette Hassell. "Do women need special secure services?" Advances in Psychiatric Treatment 7, no. 4 (July 2001): 302–9. http://dx.doi.org/10.1192/apt.7.4.302.

Full text
Abstract:
Clinicians working with women patients in secure units will already know that they are the centre of a debate not of their own making, which is about the appropriate specification of services for women patients with security needs. This paper attempts to outline the relevant issues and proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
21

Geer, D. "Taking steps to secure web services." Computer 36, no. 10 (October 2003): 14–16. http://dx.doi.org/10.1109/mc.2003.1236464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Casola, Valentina, Emilio P. Mancini, Nicola Mazzocca, Massimiliano Rak, and Umberto Villano. "Self-optimization of secure web services." Computer Communications 31, no. 18 (December 2008): 4312–23. http://dx.doi.org/10.1016/j.comcom.2008.05.045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Fenicle, Brian, and Tim Wahls. "A secure methodology for interchangeable services." Information and Software Technology 46, no. 5 (April 2004): 343–49. http://dx.doi.org/10.1016/j.infsof.2003.09.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Huckle, Phil. "Secure Psychiatric Services and The National Service Framework for Mental Health." Mental Health Review Journal 5, no. 1 (March 2000): 21–23. http://dx.doi.org/10.1108/13619322200000006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Thiel, A., T. Tolxdorff, and J. Bernarding. "Realization of Security Concepts for DICOM-based Distributed Medical Services." Methods of Information in Medicine 39, no. 04/05 (2000): 348–52. http://dx.doi.org/10.1055/s-0038-1634446.

Full text
Abstract:
Abstract:Exploiting distributed hard- and software resources for tele-medicine requires a fast, secure, and platform-independent data exchange. Standards without inherent security mechanisms such as DICOM may ease non-authorized data access. Therefore, exemplary telemedical data streams were analyzed within the Berlin metropolitan area network using specialized magnetic resonance imaging techniques and distributed resources for data postprocessing. For secure DICOM communication both the Secure Socket Layer Protocol and a DICOM-conform partial encryption of patient-relevant data were implemented. Partial encryption exhibited the highest transfer rate and enabled a secure long-term storage. Different data streams between secured and unsecured networks were realized using partial encryption.
APA, Harvard, Vancouver, ISO, and other styles
26

G.R.Sathiaseelan, J. "Architectural Framework for Secure Composite Web Services." International Journal of Computer Applications 76, no. 1 (August 23, 2013): 18–23. http://dx.doi.org/10.5120/13211-0592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Meiklejohn, Calum, Kate Sanders, and Sally Butler. "Physical health care in medium secure services." Nursing Standard 17, no. 17 (January 8, 2003): 33–37. http://dx.doi.org/10.7748/ns2003.01.17.17.33.c3323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Jae-Seung, Heang-Suk Oh, and Jong-Wook Han. "Security Architecture for Secure Mobile Web Services." Joural of the Korea Entertainment Industry Association 2, no. 2 (December 31, 2008): 43. http://dx.doi.org/10.21184/jkeia.2008.12.2.2.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Meiklejohn, Calum, Kate Sanders, and Sally Butler. "Physical health care in medium secure services." Nursing Standard 17, no. 17 (January 8, 2003): 33–37. http://dx.doi.org/10.7748/ns.17.17.33.s55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bartoletti, M., P. Degano, G. L. Ferrari, and R. Zunino. "Semantics-Based Design for Secure Web Services." IEEE Transactions on Software Engineering 34, no. 1 (January 2008): 33–49. http://dx.doi.org/10.1109/tse.2007.70740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Baldwin, Adrian, Chris Dalton, Simon Shiu, Krzysztof Kostienko, and Qasim Rajpoot. "Providing secure services for a virtual infrastructure." ACM SIGOPS Operating Systems Review 43, no. 1 (January 2009): 44–51. http://dx.doi.org/10.1145/1496909.1496919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shehab, Mohamed, Kamal Bhattacharya, and Arif Ghafoor. "Web services discovery in secure collaboration environments." ACM Transactions on Internet Technology 8, no. 1 (November 2007): 5. http://dx.doi.org/10.1145/1294148.1294153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kang, Hyun-Sun. "Security Model of Secure Cloud Computing Services." Journal of Security Engineering 14, no. 6 (December 31, 2017): 419–28. http://dx.doi.org/10.14257/jse.2017.12.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

WHYTE, SEAN, and CHARLOTTE HARRISON. "Substance Misuse Services in Secure Psychiatric Units." Medicine, Science and the Law 44, no. 1 (January 2004): 71–74. http://dx.doi.org/10.1258/rsmmsl.44.1.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Wai-Kong, Raphael C. W. Phan, Geong-Sen Poh, and Bok-Min Goi. "SearchaStore: fast and secure searchable cloud services." Cluster Computing 21, no. 2 (July 4, 2017): 1189–202. http://dx.doi.org/10.1007/s10586-017-0941-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wiseman, Simon R. "Classification services in the SWORD secure DBMS." Computers & Security 14, no. 4 (January 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

FUKAZAWA, T., T. NISASE, M. KAWASHIMA, T. HARIU, and Y. OSHIMA. "Safe and Secure Services Based on NGN." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1226–33. http://dx.doi.org/10.1093/ietisy/e91-d.5.1226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zandbelt, J. F., R. J. Hulsebosch, M. S. Bargh, and R. Arends. "Trusted Directory Services for Secure Internet Connectivity." Electronic Notes in Theoretical Computer Science 197, no. 2 (February 2008): 91–103. http://dx.doi.org/10.1016/j.entcs.2007.12.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Roman, Rodrigo, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, and Marta Bel. "Advanced secure multimedia services for digital homes." Information Systems Frontiers 14, no. 3 (July 31, 2010): 527–40. http://dx.doi.org/10.1007/s10796-010-9258-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sambrook, Suzanne. "Do recovery principles fit in secure services?" Forensic Update 1, no. 104 (2011): 17–19. http://dx.doi.org/10.53841/bpsfu.2011.1.104.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hashemi, Sajjad, Seyyed Yasser Hashemi, and Khalil Monfaredi. "A Novel Service Oriented Architecture (SOA) to Secure Services in E-City." International Journal of Security, Privacy and Trust Management 2, no. 6 (December 31, 2013): 23–29. http://dx.doi.org/10.5121/ijsptm.2013.2602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Long, C. G., C. Knight, L. Bradley, and M. Thomas. "Effective therapeutic milieus in secure services for women: The service user perspective." Journal of Mental Health 21, no. 6 (December 2012): 567–78. http://dx.doi.org/10.3109/09638237.2012.734649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Shrivastava, Vivek, and Sunil Malviya. "A Secure Multi Agent VANET Model to Improve Communication Services in VANET." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2562–66. http://dx.doi.org/10.31142/ijtsrd12833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rajkumar, M., E. Kanmani, M. Bhuvanesh, B. Haritha, and B. Kalaiyarasi. "Secure Data Access Privacy Preserving Using Cloud Services." Journal of Physics: Conference Series 1916, no. 1 (May 1, 2021): 012228. http://dx.doi.org/10.1088/1742-6596/1916/1/012228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Krovvidi, Maansa, and Ch Mvn Sai Teja Prashanth. "Distributed Cellular Framework for Secure Drone Delivery Services." International Journal of Research in Advent Technology 9, no. 9 (October 10, 2021): 1–6. http://dx.doi.org/10.32622/ijrat.99202103.

Full text
Abstract:
This paper describes in-depth the architecture of a Distributed Cellular framework for Secure Drone Delivery Services with an additional security layer. Delivery Drones are Unmanned aerial vehicles (UAV) that are responsible for the transportation of goods from one place to another place. In the modern world, with several e-commerce platforms, everything is traded, promoted, advertised online. This causes the need to deliver the packages rapidly and within a stipulated period of time. Unmanned aerial vehicles or drones come into the picture to retort the above-mentioned issue. Security nowadays has become a major concern where hackers are diverting the network traffic, hijacking, and crashing the drones. In order to prevent these attacks from taking place, this paper proposes a strong security framework to minimize these attacks from taking place. The proposed architecture has an additional layer of security which covers the two-factor and multi-factor authentication at the delivery spot. There exists an integration of different sensors like Obstacle detection, SOS detection, Facial Recognition, etc. Beyond the security framework, a distributed cellular network is applied to the delivery services to scatter the drones cell-wise and largen the scope to all remote areas.
APA, Harvard, Vancouver, ISO, and other styles
46

Bakken, Sam. "Biometrics light the way for secure financial services." Biometric Technology Today 2021, no. 6 (June 2021): 10–12. http://dx.doi.org/10.1016/s0969-4765(21)00072-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Walker, Tammi, Michelle Morgan, Laura Thompson, and Kevin Scallon. "Why medium secure services need a recovery academy." Mental Health Practice 21, no. 05 (February 6, 2018): 12. http://dx.doi.org/10.7748/mhp.21.05.12.s9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Komathy, K., P. Vivekanandan, and V. Ramachandran. "Secure Soap-Based Web Services for Distance Education." International Journal of Distance Education Technologies 1, no. 2 (April 2003): 72–86. http://dx.doi.org/10.4018/jdet.2003040105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Cong, Kui Ren, Wenjing Lou, and Jin Li. "Toward publicly auditable secure cloud data storage services." IEEE Network 24, no. 4 (July 2010): 19–24. http://dx.doi.org/10.1109/mnet.2010.5510914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Carlin, Patricia, Gisli Gudjonsson, and Mary Yates. "Patient satisfaction with services in medium secure units." Journal of Forensic Psychiatry & Psychology 16, no. 4 (December 2005): 714–28. http://dx.doi.org/10.1080/14789940500328245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography