Добірка наукової літератури з теми "Secure Services"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Services".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Services"
Exworthy, Tim. "Secure psychiatric services." Current Opinion in Psychiatry 13, no. 6 (November 2000): 581–85. http://dx.doi.org/10.1097/00001504-200011000-00019.
Повний текст джерелаCampbell, Andrea. "High secure services." British Journal of Forensic Practice 7, no. 4 (November 2005): 27–32. http://dx.doi.org/10.1108/14636646200500026.
Повний текст джерелаKarokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services." International Journal of Electronic Government Research 8, no. 1 (January 2012): 1–25. http://dx.doi.org/10.4018/jegr.2012010101.
Повний текст джерелаBeales, D. "Pendulummanagement in secure services." British Journal of Psychiatry 184, no. 3 (March 2004): 270–71. http://dx.doi.org/10.1192/bjp.184.3.270-a.
Повний текст джерелаRahman, Nor Azlina Abd. "A Conceptual Diagram for Secure Virtual Office Services." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1251–60. http://dx.doi.org/10.37200/ijpr/v23i4/pr190451.
Повний текст джерелаCoid, Jeremy, Nadji Kahtan, Simon Gault, Adrian Cook, and Brian Jarman. "Medium secure forensic psychiatry services." British Journal of Psychiatry 178, no. 1 (January 2001): 55–61. http://dx.doi.org/10.1192/bjp.178.1.55.
Повний текст джерелаBhargavan, Karthikeyan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. "Secure sessions for Web services." ACM Transactions on Information and System Security 10, no. 2 (May 2007): 8. http://dx.doi.org/10.1145/1237500.1237504.
Повний текст джерелаOrakwue, Enuma. "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 295–98. http://dx.doi.org/10.1080/19393550903482924.
Повний текст джерелаPinto, António, and Manuel Ricardo. "Secure multicast in IPTV services." Computer Networks 54, no. 10 (July 2010): 1531–42. http://dx.doi.org/10.1016/j.comnet.2009.12.007.
Повний текст джерелаShin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.
Повний текст джерелаДисертації з теми "Secure Services"
Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.
Повний текст джерелаAli, Mazhar. "Towards Secure Cloud Storage Services." Diss., North Dakota State University, 2015. http://hdl.handle.net/10365/24802.
Повний текст джерелаHines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.
Повний текст джерелаOne of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.
Повний текст джерелаGuerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.
Повний текст джерелаSensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.
In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communications in the neighborhood of the network. Our goal is to generate extra traffic in an intelligent way so that it can effectively mask user activity without draining the energy from the sensors.
Hayton, Richard. "An open architecture for secure interworking services." Thesis, University of Cambridge, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313860.
Повний текст джерелаPotebenko, Maria, and Alina Shliakhovska. "Secure environment for e-services in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51120.
Повний текст джерелаThe concept of e-service represents one prominent application of utilizing the use of information and communication technologies in different areas. Basically, there are three main components: service provider, service receiver and the channels of service delivery. For example, as concerned to public e-service, public agencies are the service provider and citizens as well as businesses are the service receiver. The channel of service delivery is the third requirement of e-service. Internet is the main channel of e-service delivery while other classic channels are also considered.
Концепція електронного сервісу являє собою одне з видатних застосувань використання інформаційно-комунікаційних технологій у різних сферах. В основному, є три основні компоненти: постачальник послуг, приймач послуг та канали надання послуг. Наприклад, що стосується державної електронної послуги, державні установи є постачальником послуг, а громадяни, а також підприємства - отримувачами послуг. Канал надання послуг є третьою вимогою електронної послуги. Інтернет є основним каналом надання електронних послуг, тоді як інші класичні канали також розглядаються.
Barnes, Cheontell Marie. "Relating following aggression : women's medium secure services." Thesis, University of Essex, 2015. http://repository.essex.ac.uk/16837/.
Повний текст джерелаKrohn, Maxwell (Maxwell N. ). "Building fast and secure Web services with OKWS." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34364.
Повний текст джерелаIncludes bibliographical references (p. 69-74).
OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS's throughput and responsiveness exceed that of Apache 2, Flash and Haboob. Experience with OKWS in a commercial deployment suggests it can reduce hardware and system management costs, while providing security guarantees absent in current systems. In the end, lessons gleaned from the OKWS project provide insight into how operating systems might better facilitate secure application design.
by Maxwell Krohn.
S.M.
Li, Hong Ping. "Secure proximity queries in mobile geo-social services." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_ra/1551.
Повний текст джерелаКниги з теми "Secure Services"
Arvind, Durai, ed. Cisco secure firewall services module (FWSM). Indianapolis, IN: Cisco Press, 2009.
Знайти повний текст джерелаScalable and secure internet services and architecture. Boca Raton, Fla: Chapman & Hall/CRC, 2005.
Знайти повний текст джерелаHeisel, Maritta, Wouter Joosen, Javier Lopez, and Fabio Martinelli, eds. Engineering Secure Future Internet Services and Systems. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07452-8.
Повний текст джерелаRicard, Sarff, ed. EMS for secure facilities. Australia: Delmar Cengage Learning, 2012.
Знайти повний текст джерелаHealth, Great Britain Department of. Secure accommodation: Guidance and regulations. London: Department of Health, 1990.
Знайти повний текст джерелаAgency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.
Знайти повний текст джерелаAgency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.
Знайти повний текст джерелаAcharjya, D. P., and B. K. Tripathy. Advances in secure computing, internet services, and applications. Hershey, PA: Information Science Reference, an imprint of IGI Global, 2014.
Знайти повний текст джерелаPsychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.
Знайти повний текст джерелаHarvey, Joel. Psychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.
Знайти повний текст джерелаЧастини книг з теми "Secure Services"
Kalliola, Aapo, Tuomas Aura, and Sanja Šćepanović. "Denial-of-Service Mitigation for Internet Services." In Secure IT Systems, 213–28. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_13.
Повний текст джерелаLeitold, Herbert, Karl Christian Posch, and Reinhard Posch. "ISDN Security Services." In Secure Information Networks, 21–35. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_2.
Повний текст джерелаBertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Secure Publishing Techniques." In Security for Web Services and Service-Oriented Architectures, 147–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_7.
Повний текст джерелаMohanty, Vakul, and Chittaranjan Hota. "Secure Web Services Negotiation." In Communications in Computer and Information Science, 609–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_62.
Повний текст джерелаBasile, Davide, Pierpaolo Degano, and Gian-Luigi Ferrari. "Secure and Unfailing Services." In Lecture Notes in Computer Science, 167–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39958-9_15.
Повний текст джерелаBaker, Matthew. "Installing and Configuring Services." In Secure Web Application Development, 95–161. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_5.
Повний текст джерелаde Balthasar, Thibault, and Julio Hernandez-Castro. "An Analysis of Bitcoin Laundry Services." In Secure IT Systems, 297–312. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_18.
Повний текст джерелаJin, Hongyu, and Panos Papadimitratos. "Resilient Collaborative Privacy for Location-Based Services." In Secure IT Systems, 47–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_4.
Повний текст джерелаTschudin, Christian. "Apoptosis — the Programmed Death of Distributed Services." In Secure Internet Programming, 253–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_11.
Повний текст джерелаShah, Vikas S. "Blockchain Driven Three Domain Secure 2.x in Digital Payment Services Architecture." In Services – SERVICES 2020, 11–27. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59595-1_2.
Повний текст джерелаТези доповідей конференцій з теми "Secure Services"
Yun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.
Повний текст джерелаPino, Luca, and George Spanoudakis. "Constructing Secure Service Compositions with Patterns." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.61.
Повний текст джерелаChen, Zhixiong, and John Yoon. "IT Auditing to Assure a Secure Cloud Computing." In 2010 IEEE Congress on Services (SERVICES). IEEE, 2010. http://dx.doi.org/10.1109/services.2010.118.
Повний текст джерелаLim, Yu-xi, and Henry Owen. "Secure wireless location services." In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342870.
Повний текст джерелаWetzel, S. "Session details: Secure services." In WiSE04: 2004 ACM Workshop on Wireless Security ( co-located with Mobicom 2004 Conference ). New York, NY, USA: ACM, 2004. http://dx.doi.org/10.1145/3259527.
Повний текст джерелаDean, Daniel J., Rohit Ranchal, Yu Gu, Anca Sailer, Shakil Khan, Kirk Beaty, Senthil Bakthavachalam, Yichong Yu, Yaoping Ruan, and Paul Bastide. "Engineering Scalable, Secure, Multi-Tenant Cloud for Healthcare Data." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.13.
Повний текст джерелаHorrow, Susmita, Sanchika Gupta, Anjali Sardana, and Ajith Abraham. "Secure Private Cloud Architecture for Mobile Infrastructure as a Service." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.25.
Повний текст джерелаMaule, R. William. "SoaML and UPIA Model Integration for Secure Distributed SOA Clouds." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.27.
Повний текст джерелаLaranjeiro, Nuno, Pedro Furtado, and Marco Vieira. "IEEE International Workshop on Dependable and Secure Services (DSS 2014)." In 2014 IEEE World Congress on Services (SERVICES). IEEE, 2014. http://dx.doi.org/10.1109/services.2014.43.
Повний текст джерелаWoo, Sungpil, Jaehee Ha, Jaewook Byun, Kiwoong Kwon, Yalew Tolcha, Daeyoun Kang, Hoang Minh Nguyen, Myungchul Kim, and Daeyoung Kim. "Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.16.
Повний текст джерелаЗвіти організацій з теми "Secure Services"
Keromytis, Angelos D., Vishal Misra, and Dan Rubenstein. Secure Overlay Services (SOS). Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada426757.
Повний текст джерелаAli, Alee Rizwan, and Brye Ann Steeves. Secure Information Services (WRS-SIS). Office of Scientific and Technical Information (OSTI), May 2020. http://dx.doi.org/10.2172/1631547.
Повний текст джерелаSinghal, A., T. Winograd, and K. A. Scarfone. Guide to secure web services. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-95.
Повний текст джерелаBrodsky, Micah, Petros Efstathopoulos, Frans Kaashoek, Eddie Kohier, Maxwell Krohn, David Mazieres, Robert Morris, Steve VanDeBogart, and Alexander Yip. Toward Secure Services from Untrusted Developers. Fort Belvoir, VA: Defense Technical Information Center, August 2007. http://dx.doi.org/10.21236/ada477317.
Повний текст джерелаSlätmo, Elin, Ágúst Bogason, Anna Vasilevskaya, and Hilma Salonen. Essential rural services in the Nordic Region – Challenges and opportunities. Nordregio, March 2022. http://dx.doi.org/10.6027/r2022:1.1403-2503.
Повний текст джерелаShaw, Liz, Michael Nunns, Simon Briscoe, Amelia Mosley, Daniel Dalton, Rob Anderson, and Jo Thompson Coon. Evidence for specialist treatment of people with acquired brain injury in secure psychiatric services: systematic review and narrative synthesis. NIHR, August 2020. http://dx.doi.org/10.3310/hsdr-tr-130320.
Повний текст джерелаCalatayud, Agustina, and Paul Constance. A roadmap to the mobility and logistics trends that are reshaping Latin America and the Caribbean. Inter-American Development Bank, August 2022. http://dx.doi.org/10.18235/0004413.
Повний текст джерелаHoffman, P. SMTP Service Extension for Secure SMTP over TLS. RFC Editor, January 1999. http://dx.doi.org/10.17487/rfc2487.
Повний текст джерелаReiter, Michael, and Kenneth Birman. How to Securely Replicate Services. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada252952.
Повний текст джерелаChandramouli, Ramaswamy, and Zack Butcher. Building secure microservices-based applications using service-mesh architecture. Gaithersburg, MD: National Institute of Standards and Technology, May 2020. http://dx.doi.org/10.6028/nist.sp.800-204a.
Повний текст джерела