Artigos de revistas sobre o tema "Trust by the way of security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Trust by the way of security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund". Challenge 49, n.º 3 (junho de 2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Texto completo da fonteWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security". Journal of ISMAC 3, n.º 4 (19 de abril de 2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Texto completo da fonteBräunlich, Katharina, e Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems". International Journal of Information Security and Privacy 7, n.º 2 (abril de 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Texto completo da fonteGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam e Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security". International Journal of Interactive Mobile Technologies (iJIM) 13, n.º 04 (10 de abril de 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Texto completo da fonteZhakshylykova, T. A. "Psychological trust in social networks". Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), n.º 8 (7 de agosto de 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Texto completo da fonteKim, Sangyoung, e Taebok Lee. "Factors affecting information security compliance intention of military officer". Journal of Advances in Military Studies 5, n.º 1 (30 de abril de 2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Texto completo da fonteCao, Xiao Mei, Hai Tao Zhu, He Yang Shen e Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network". Applied Mechanics and Materials 462-463 (novembro de 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Texto completo da fonteSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools". International Research Journal of Innovations in Engineering and Technology 08, n.º 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Texto completo da fonteKumawat, Shyamlal, e Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, n.º 2 (25 de outubro de 2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Texto completo da fonteSreevidya, B., e Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, n.º 1 (29 de março de 2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
Texto completo da fonteEl-Sayed, Hesham, Sharmi Sankar, Heng Yu e Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs". International Journal of Computers Communications & Control 12, n.º 5 (10 de setembro de 2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Texto completo da fonteXu, Mingyang, Junli Guo, Haoyu Yuan e Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture". Electronics 12, n.º 4 (4 de fevereiro de 2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Texto completo da fontePavlidis, Michalis, Haralambos Mouratidis e Shareeful Islam. "Modelling Security Using Trust Based Concepts". International Journal of Secure Software Engineering 3, n.º 2 (abril de 2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Texto completo da fonteZhi, Kuiyun, Qiurong Tan, Si Chen, Yongjin Chen, Xiaoqin Wu, Chenkai Xue e Anbang Song. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction". International Journal of Environmental Research and Public Health 19, n.º 11 (3 de junho de 2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Texto completo da fonteJoshi, Prince, Vishal Dhangar, Manish Muchhala e Surajbhan Singh Mandloi. "Cloud Computing Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 1 (31 de janeiro de 2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Texto completo da fonteYan, Ye, e Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective". Sustainability 10, n.º 7 (17 de julho de 2018): 2495. http://dx.doi.org/10.3390/su10072495.
Texto completo da fonteManalu, Ignasius Falentino, Basrah Saidani e Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta". Jurnal Bisnis, Manajemen, dan Keuangan 3, n.º 1 (21 de outubro de 2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Texto completo da fonteSingh, Supriya. "The Social Dimensions of the Security of Internet Banking". Journal of Theoretical and Applied Electronic Commerce Research 1, n.º 2 (1 de agosto de 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Texto completo da fonteSun, Po-Ling, e Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, n.º 3 (8 de abril de 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Texto completo da fonteUsman, Aminu Bello, William Liu, Quan Bai e Ajit Narayanan. "Trust of the Same". International Journal of Information Security and Privacy 9, n.º 2 (abril de 2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Texto completo da fonteLalli, M., e J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET". Asian Journal of Engineering and Applied Technology 7, n.º 2 (5 de novembro de 2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Texto completo da fonteCurtis, Shelby R., Jessica Rose Carre e Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach". Managerial Auditing Journal 33, n.º 4 (3 de abril de 2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Texto completo da fonteNegi, Shalabh, e Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES". Asian Journal of Pharmaceutical and Clinical Research 10, n.º 13 (1 de abril de 2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Texto completo da fonteNurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG". Jurnal Ecogen 1, n.º 4 (21 de dezembro de 2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Texto completo da fonteWenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination". Review of European Administrative Law 13, n.º 3 (15 de outubro de 2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Texto completo da fonteJagadamba, G., e B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, n.º 4 (outubro de 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Texto completo da fonteUdayana, IBN, Putri Dwi Cahyani e Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)". Journal Competency of Business 2, n.º 1 (2 de julho de 2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Texto completo da fonteChen, Guangxuan, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen e Qiang Liu. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud". International Journal of Digital Crime and Forensics 10, n.º 1 (janeiro de 2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Texto completo da fonteLeahy, Darragh, e Christina Thorpe. "Zero Trust Container Architecture (ZTCA)". International Conference on Cyber Warfare and Security 17, n.º 1 (2 de março de 2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Texto completo da fonteUrmetzer, Florian, e Isabelle Walinski. "User Acceptance and Mobile Payment Security". International Journal of E-Services and Mobile Applications 6, n.º 2 (abril de 2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Texto completo da fonteSa’diyah, Mima Halimatus, e Dedi Sulistiyo Soegoto. "The Effect of Perceived Security towards Intention to Use Digital Payment through a Trust". Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 2 (1 de dezembro de 2021): 233–38. http://dx.doi.org/10.34010/icobest.v2i.277.
Texto completo da fonteNitta, Mellania Ariya, e Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen". Journal of Management and Bussines (JOMB) 4, n.º 2 (19 de dezembro de 2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Texto completo da fonteGupta, Vishwajit, e Sumitra Shukla. "Consumer Trust in Digital Banking: A Qualitative Study of Legal and Regulatory Impacts". Interdisciplinary Studies in Society, Law, and Politics 3, n.º 2 (2024): 18–24. http://dx.doi.org/10.61838/kman.isslp.3.2.4.
Texto completo da fonteMa, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu e Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization". Future Internet 16, n.º 5 (10 de maio de 2024): 163. http://dx.doi.org/10.3390/fi16050163.
Texto completo da fonteOlaniyi, Oluwaseun Oladeji. "Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies". Asian Journal of Research in Computer Science 17, n.º 5 (15 de março de 2024): 172–89. http://dx.doi.org/10.9734/ajrcos/2024/v17i5447.
Texto completo da fonteNasreen, Irfana, Kashif Rathore e Kashif Ali. "WORKPLACE SECURITY;". Professional Medical Journal 24, n.º 01 (18 de janeiro de 2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.
Texto completo da fonteM. Habash, Rania, e Mahmood Khalel. "ZERO TRUST SECURITY MODEL FOR ENTERPRISE NETWORKS". Iraqi Journal of Information and Communication Technology 6, n.º 2 (31 de agosto de 2023): 68–77. http://dx.doi.org/10.31987/ijict.6.2.223.
Texto completo da fonteÞórisdóttir, Hulda, e Eva Heiða Önnudóttir. "Need for security and system fairness on the political extremes". Veftímaritið Stjórnmál og stjórnsýsla 11, n.º 2 (15 de dezembro de 2015): 115. http://dx.doi.org/10.13177/irpa.a.2015.11.2.1.
Texto completo da fonteProkin, A. A. "Cloud Security Data Critical Review". Journal of Computational and Theoretical Nanoscience 17, n.º 9 (1 de julho de 2020): 4715–17. http://dx.doi.org/10.1166/jctn.2020.9366.
Texto completo da fonteAgrawal, Arpit, e Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol". Oriental journal of computer science and technology 10, n.º 2 (26 de maio de 2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.
Texto completo da fonteLi, Dawei, Enzhun Zhang, Ming Lei e Chunxiao Song. "Zero trust in edge computing environment: a blockchain based practical scheme". Mathematical Biosciences and Engineering 19, n.º 4 (2022): 4196–216. http://dx.doi.org/10.3934/mbe.2022194.
Texto completo da fonteFarooq, Umer, Muhammad Asim, Noshina Tariq, Thar Baker e Ali Ismail Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security". Sensors 22, n.º 12 (16 de junho de 2022): 4539. http://dx.doi.org/10.3390/s22124539.
Texto completo da fonteMannix, Kealan, Aengus Gorey, Donna O’Shea e Thomas Newe. "Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them". Journal of Sensor and Actuator Networks 11, n.º 3 (8 de agosto de 2022): 43. http://dx.doi.org/10.3390/jsan11030043.
Texto completo da fonteLi, Jing, e Qinyuan Li. "Data security and risk assessment in cloud computing". ITM Web of Conferences 17 (2018): 03028. http://dx.doi.org/10.1051/itmconf/20181703028.
Texto completo da fonteWang, Zhiqiang, Xinyue Yu, Peiyang Xue, Yunhan Qu e Lei Ju. "Research on Medical Security System Based on Zero Trust". Sensors 23, n.º 7 (6 de abril de 2023): 3774. http://dx.doi.org/10.3390/s23073774.
Texto completo da fonteBingzhang, Lee, e Anton Mamoiko. "DEVELOPING SELF-EXECUTING SMART CONTRACTS ON ETHEREUM FOR CONTAINER SHIPPING IN CHINA". T-Comm 16, n.º 8 (2022): 38–45. http://dx.doi.org/10.36724/2072-8735-2022-16-8-38-45.
Texto completo da fonteNabilah, Yasmin Rajaa, e Andri Nurtantiono. "PENGARUH WORD OF MOUTH (WOM), KUALITAS PELAYANAN, KEAMANAN DAN KEPERCAYAAN TERHADAP KEPUTUSAN KONSUMEN MENGGUNAKAN JASA TRANSPORTASI ONLINE GRABBIKE DI KOTA SURAKARTA". JURNAL ILMIAH EDUNOMIKA 5, n.º 1 (12 de fevereiro de 2021): 61. http://dx.doi.org/10.29040/jie.v5i1.1381.
Texto completo da fonteAli Azmi, Muhammad, Sulhaini Sulhaini e Dwi Putra Buana Sakti. "The Influence Of Privacy, Security, And Trust On Costumer Loyalty Lazada Applications In Lombok Island". PROCEEDING INTERNATIONAL CONFERENCE ON ECONOMICS, BUSINESS AND INFORMATION TECHNOLOGY (ICEBIT) 4 (14 de julho de 2023): 247–55. http://dx.doi.org/10.31967/prmandala.v4i0.754.
Texto completo da fonteHabibur Rahman, Md, Md Al-Amin e Nusrat Sharmin Lipy. "An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh". Risk and Financial Management 2, n.º 2 (15 de dezembro de 2020): p47. http://dx.doi.org/10.30560/rfm.v2n2p47.
Texto completo da fonteKydd, Andrew. "Trust Building, Trust Breaking: The Dilemma of NATO Enlargement". International Organization 55, n.º 4 (2001): 801–28. http://dx.doi.org/10.1162/002081801317193600.
Texto completo da fonte