Добірка наукової літератури з теми "Secure Services"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Services".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Secure Services"

1

Exworthy, Tim. "Secure psychiatric services." Current Opinion in Psychiatry 13, no. 6 (November 2000): 581–85. http://dx.doi.org/10.1097/00001504-200011000-00019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Campbell, Andrea. "High secure services." British Journal of Forensic Practice 7, no. 4 (November 2005): 27–32. http://dx.doi.org/10.1108/14636646200500026.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services." International Journal of Electronic Government Research 8, no. 1 (January 2012): 1–25. http://dx.doi.org/10.4018/jegr.2012010101.

Повний текст джерела
Анотація:
E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Beales, D. "Pendulummanagement in secure services." British Journal of Psychiatry 184, no. 3 (March 2004): 270–71. http://dx.doi.org/10.1192/bjp.184.3.270-a.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rahman, Nor Azlina Abd. "A Conceptual Diagram for Secure Virtual Office Services." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 20, 2019): 1251–60. http://dx.doi.org/10.37200/ijpr/v23i4/pr190451.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Coid, Jeremy, Nadji Kahtan, Simon Gault, Adrian Cook, and Brian Jarman. "Medium secure forensic psychiatry services." British Journal of Psychiatry 178, no. 1 (January 2001): 55–61. http://dx.doi.org/10.1192/bjp.178.1.55.

Повний текст джерела
Анотація:
BackgroundRegional medium secure developments have proceeded unevenly, with wide variations in resources to deliver services.AimsTo compare patients admitted to seven (pre-reorganisation) regional services and styles of service delivery.MethodA record survey of a complete sample of 2608 patients admitted on 3403 occasions between 1 January 1988 and 31 December 1994.ResultsServices differed according to location of patients before admission, their legal basis for detention, criminal and antisocial behaviour, diagnosis, security needs and length of stay. Regions with more resources and lower demand provided a wider range of services. Thames services were relatively under-provided during the study period, with North East Thames substantially reliant on admissions to private hospitals.ConclusionsUncoordinated development led to under-provision despite high demand. Certain regions prioritised offender patients and did not support local psychiatric services. New standards are required for service specification and resource allocation to redress inequality. Traditional performance measures were of limited usefulness in comparing services.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bhargavan, Karthikeyan, Ricardo Corin, Cédric Fournet, and Andrew D. Gordon. "Secure sessions for Web services." ACM Transactions on Information and System Security 10, no. 2 (May 2007): 8. http://dx.doi.org/10.1145/1237500.1237504.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Orakwue, Enuma. "Private Clouds: Secure Managed Services." Information Security Journal: A Global Perspective 19, no. 6 (November 23, 2010): 295–98. http://dx.doi.org/10.1080/19393550903482924.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Pinto, António, and Manuel Ricardo. "Secure multicast in IPTV services." Computer Networks 54, no. 10 (July 2010): 1531–42. http://dx.doi.org/10.1016/j.comnet.2009.12.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.

Повний текст джерела
Анотація:
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Secure Services"

1

Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.

Повний текст джерела
Анотація:
Graphs are powerful tools for a wide range of real applications, from Biological and Chemical Databases, Social Networks, Citation Networks to Knowledge Bases. Large graph data repositories have been consistently found in recent applications. Due to the high complexity of graph queries, e.g., NP-Completeness of subgraph query, and the lack of IT expertise, hosting efficient graph query services for the owners of graph data has been a technically challenging task. And hence, they may prefer to outsource their services to third-party service providers (SPs) for scalability, elasticity and efficiency. Unfortunately, SPs may not always be trusted. Security, typically the integrity and confidentiality, of the data, has been recognized as one of the critical attributes of Quality of Services (QoS). This directly influences the willingness of both data owners and query clients to use SP’s services. To address these concerns, this thesis proposes novel techniques to solve both authentication-aware and privacy-aware subgraph query. Firstly, we study authenticated subgraph query services (Chapter 3). To support the service, we propose Merkle IFTree (MIFTree) where Merkle hash trees are applied into our Intersection-aware Feature-subgraph Tree (IFTree). IFTree aims to minimize I/O in a well-received subgraph query paradigm namely the filtering-and-verification framework. The structures required to be introduced to verification objects (VOs) and the authentication time are minimized. Subsequently, the overall response time is minimized. For optimizations, we propose an enhanced authentication method on MIFTree. Secondly, we propose structure-preserving subgraph query services (Chapter 4). A crucial step of this part is to transform the seminal subgraph isomorphism algorithm (the Ullmann’s algorithm) into a series of matrix operations. We propose a novel cyclic group based encryption (CGBE) method for private matrix operations. We propose a protocol that involves the query client and static indexes for optimizations. We prove that the structural information of both query graph and data graph are preserved under CGBE and analyze the privacy preservation in the presence of the optimizations. Thirdly, we propose asymmetric structure-preserving subgraph query processing (Chapter 5), where the data graph is publicly known and the query structure/topology is kept secret. Unlike other previous methods for subgraph queries, this part proposes a series of novel optimizations that only exploit graph structures, not the queries. Further, we propose a robust query encoding and adopt our proposed cyclic group based encryption method, so that the query processing can be transformed into a series of private matrix operations and performed securely. The effectiveness and efficiency of all the techniques presented in this thesis are experimentally evaluated with both real-world and synthetic dataset
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ali, Mazhar. "Towards Secure Cloud Storage Services." Diss., North Dakota State University, 2015. http://hdl.handle.net/10365/24802.

Повний текст джерела
Анотація:
Cloud computing is anticipated to revolutionize the Information and Communication Technology sector and has been a mainstream of research over the last decade. The cloud computing, upsurges the capabilities of the hardware resources by optimal and shared utilization. The above mentioned features encourage the organizations and individual users to shift their data, applications and services to the cloud. However, the services provided by third-party cloud service providers entail additional security threats. Data being one of the prime assets of the organizations must be protected from all sorts of security threats. The data in the cloud is much more vulnerable to risks in terms of confidentiality, integrity, and availability in comparison to the conventional computing model. The ever increasing number of users and applications leads to enhanced security risks. Violation of integrity may also result from multi-tenant nature of the cloud. Employee of SaaS providers, having access to information may also act as a potential risk. Considering the paramount importance of data security in the cloud environment, we propose methodologies towards the secure cloud storage services. We propose methodologies to secure: (a) Single user data, (b) Group shared data, and (c) approach security and performance collectively. We propose Data Security for Cloud Environment with Semi-trusted third party (DaSCE) protocol, a cloud storage security system that provide key management, access control, and file assured deletion. Parts of keys are stored at semi-trusted servers called key managers. The key management is accomplished using (k, n) threshold secret sharing mechanism. Finally, we present the DROPS methodology that collectively deals with the security and performance in terms of retrieval time. The data file is fragmented and the fragments are dispersed over multiple nodes. The nodes are separated by means of T-coloring. The fragmentation and dispersal ensures that no significant information is obtainable by an adversary in case of a successful attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.

Повний текст джерела
Анотація:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California
One of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Guerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.

Повний текст джерела
Анотація:

Sensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.

In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communications in the neighborhood of the network. Our goal is to generate extra traffic in an intelligent way so that it can effectively mask user activity without draining the energy from the sensors.

Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hayton, Richard. "An open architecture for secure interworking services." Thesis, University of Cambridge, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313860.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Potebenko, Maria, and Alina Shliakhovska. "Secure environment for e-services in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51120.

Повний текст джерела
Анотація:
1. Services & Specialties - E-services [Electronic resource]. – Access mode: https://sites.google.com/a/sharadarupasinghe.com/e-services/services 2. Electronic services by categories | Cabinet Ministers of Ukraine (in Ukrainian) [Electronic resource]. – Access mode: https://www.kmu.gov.ua/servicesfilter 3. Current state, problems and prospects for the development of electronic administrative services in Ukraine (in Ukrainian) [Electronic resource]. – Access mode: https://niss.gov.ua/doslidzhennya/politika/suchasniy-stan-problemi-i-perspektivi-rozvitku-vukraini-elektronnikh
The concept of e-service represents one prominent application of utilizing the use of information and communication technologies in different areas. Basically, there are three main components: service provider, service receiver and the channels of service delivery. For example, as concerned to public e-service, public agencies are the service provider and citizens as well as businesses are the service receiver. The channel of service delivery is the third requirement of e-service. Internet is the main channel of e-service delivery while other classic channels are also considered.
Концепція електронного сервісу являє собою одне з видатних застосувань використання інформаційно-комунікаційних технологій у різних сферах. В основному, є три основні компоненти: постачальник послуг, приймач послуг та канали надання послуг. Наприклад, що стосується державної електронної послуги, державні установи є постачальником послуг, а громадяни, а також підприємства - отримувачами послуг. Канал надання послуг є третьою вимогою електронної послуги. Інтернет є основним каналом надання електронних послуг, тоді як інші класичні канали також розглядаються.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Barnes, Cheontell Marie. "Relating following aggression : women's medium secure services." Thesis, University of Essex, 2015. http://repository.essex.ac.uk/16837/.

Повний текст джерела
Анотація:
Background: Women in medium secure services can present with aggressive behaviours and a high level of risk to self and others. Research suggests frontline staff are frequently the victims of, or witness to aggression by forensic inpatients. The therapeutic relationship is proposed as central to therapeutic outcome, but may be jeopardised by inpatient aggression. Staff perceptions of the therapeutic relationship and aggression have not been explored in women’s medium secure services. The study aimed to develop a theoretical model grounded in frontline staff perceptions of the therapeutic alliance and aggression in a women’s medium secure services. Method: The data from 13 semi-structured interviews conducted with frontline staff was analysed using Constructivist Grounded Theory methods. Results: The tentative descriptive theoretical model “Relating Following Aggression” emerged from the interview data. Contextual information supports five core categories, and the related sub-categories. The findings propose the therapeutic relationship is intrinsically linked to boundaries, and boundary violations could result in relational deterioration. Aggression affected the emotional and psychological wellbeing of the participants, and compromised the staff-patient relationship. The participants were fearful of aggression occurring in their workplace which resulted in them spending less time with the women and withdrawing from the therapeutic relationship. Conclusion: The findings reveal the complexity of the frontline staff-patient relationship in women’s services. Aggression occurring between frontline staff and women can seriously compromise the therapeutic relationship through a crossing of the boundary line and a perceived breach of trust. Greater support for both the frontline staff and women is required. Future research is recommended. Keywords: Frontline staff, women, aggression, forensic, therapeutic relationship, Constructivist Grounded Theory.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Krohn, Maxwell (Maxwell N. ). "Building fast and secure Web services with OKWS." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34364.

Повний текст джерела
Анотація:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Includes bibliographical references (p. 69-74).
OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS's throughput and responsiveness exceed that of Apache 2, Flash and Haboob. Experience with OKWS in a commercial deployment suggests it can reduce hardware and system management costs, while providing security guarantees absent in current systems. In the end, lessons gleaned from the OKWS project provide insight into how operating systems might better facilitate secure application design.
by Maxwell Krohn.
S.M.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Li, Hong Ping. "Secure proximity queries in mobile geo-social services." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_ra/1551.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Secure Services"

1

Arvind, Durai, ed. Cisco secure firewall services module (FWSM). Indianapolis, IN: Cisco Press, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Scalable and secure internet services and architecture. Boca Raton, Fla: Chapman & Hall/CRC, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Heisel, Maritta, Wouter Joosen, Javier Lopez, and Fabio Martinelli, eds. Engineering Secure Future Internet Services and Systems. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07452-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ricard, Sarff, ed. EMS for secure facilities. Australia: Delmar Cengage Learning, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Health, Great Britain Department of. Secure accommodation: Guidance and regulations. London: Department of Health, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Agency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Agency, Canada Border Services. Canada Border Services Agency: Smart and secure borders. [Ottawa]: Canada Border Services Agency, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Acharjya, D. P., and B. K. Tripathy. Advances in secure computing, internet services, and applications. Hershey, PA: Information Science Reference, an imprint of IGI Global, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Psychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Harvey, Joel. Psychological therapy in prisons and other secure settings. Milton Park, Abingdon: Willan, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Secure Services"

1

Kalliola, Aapo, Tuomas Aura, and Sanja Šćepanović. "Denial-of-Service Mitigation for Internet Services." In Secure IT Systems, 213–28. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Leitold, Herbert, Karl Christian Posch, and Reinhard Posch. "ISDN Security Services." In Secure Information Networks, 21–35. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Secure Publishing Techniques." In Security for Web Services and Service-Oriented Architectures, 147–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mohanty, Vakul, and Chittaranjan Hota. "Secure Web Services Negotiation." In Communications in Computer and Information Science, 609–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_62.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Basile, Davide, Pierpaolo Degano, and Gian-Luigi Ferrari. "Secure and Unfailing Services." In Lecture Notes in Computer Science, 167–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39958-9_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Baker, Matthew. "Installing and Configuring Services." In Secure Web Application Development, 95–161. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

de Balthasar, Thibault, and Julio Hernandez-Castro. "An Analysis of Bitcoin Laundry Services." In Secure IT Systems, 297–312. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jin, Hongyu, and Panos Papadimitratos. "Resilient Collaborative Privacy for Location-Based Services." In Secure IT Systems, 47–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tschudin, Christian. "Apoptosis — the Programmed Death of Distributed Services." In Secure Internet Programming, 253–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shah, Vikas S. "Blockchain Driven Three Domain Secure 2.x in Digital Payment Services Architecture." In Services – SERVICES 2020, 11–27. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59595-1_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Secure Services"

1

Yun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Pino, Luca, and George Spanoudakis. "Constructing Secure Service Compositions with Patterns." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.61.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Chen, Zhixiong, and John Yoon. "IT Auditing to Assure a Secure Cloud Computing." In 2010 IEEE Congress on Services (SERVICES). IEEE, 2010. http://dx.doi.org/10.1109/services.2010.118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lim, Yu-xi, and Henry Owen. "Secure wireless location services." In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342870.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Wetzel, S. "Session details: Secure services." In WiSE04: 2004 ACM Workshop on Wireless Security ( co-located with Mobicom 2004 Conference ). New York, NY, USA: ACM, 2004. http://dx.doi.org/10.1145/3259527.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dean, Daniel J., Rohit Ranchal, Yu Gu, Anca Sailer, Shakil Khan, Kirk Beaty, Senthil Bakthavachalam, Yichong Yu, Yaoping Ruan, and Paul Bastide. "Engineering Scalable, Secure, Multi-Tenant Cloud for Healthcare Data." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Horrow, Susmita, Sanchika Gupta, Anjali Sardana, and Ajith Abraham. "Secure Private Cloud Architecture for Mobile Infrastructure as a Service." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Maule, R. William. "SoaML and UPIA Model Integration for Secure Distributed SOA Clouds." In 2012 IEEE World Congress on Services (SERVICES). IEEE, 2012. http://dx.doi.org/10.1109/services.2012.27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Laranjeiro, Nuno, Pedro Furtado, and Marco Vieira. "IEEE International Workshop on Dependable and Secure Services (DSS 2014)." In 2014 IEEE World Congress on Services (SERVICES). IEEE, 2014. http://dx.doi.org/10.1109/services.2014.43.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Woo, Sungpil, Jaehee Ha, Jaewook Byun, Kiwoong Kwon, Yalew Tolcha, Daeyoun Kang, Hoang Minh Nguyen, Myungchul Kim, and Daeyoung Kim. "Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications." In 2017 IEEE World Congress on Services (SERVICES). IEEE, 2017. http://dx.doi.org/10.1109/services.2017.16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Secure Services"

1

Keromytis, Angelos D., Vishal Misra, and Dan Rubenstein. Secure Overlay Services (SOS). Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada426757.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ali, Alee Rizwan, and Brye Ann Steeves. Secure Information Services (WRS-SIS). Office of Scientific and Technical Information (OSTI), May 2020. http://dx.doi.org/10.2172/1631547.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Singhal, A., T. Winograd, and K. A. Scarfone. Guide to secure web services. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-95.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Brodsky, Micah, Petros Efstathopoulos, Frans Kaashoek, Eddie Kohier, Maxwell Krohn, David Mazieres, Robert Morris, Steve VanDeBogart, and Alexander Yip. Toward Secure Services from Untrusted Developers. Fort Belvoir, VA: Defense Technical Information Center, August 2007. http://dx.doi.org/10.21236/ada477317.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Slätmo, Elin, Ágúst Bogason, Anna Vasilevskaya, and Hilma Salonen. Essential rural services in the Nordic Region – Challenges and opportunities. Nordregio, March 2022. http://dx.doi.org/10.6027/r2022:1.1403-2503.

Повний текст джерела
Анотація:
The objective of this knowledge overview of the project “Service provision and access to services in Nordic rural areas – secure, trusted and for all ages” is to analyse how essential service needs for different types of societal groups and ruralities can be understood and defined, and how solutions to rural service provision challenges can be organised.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Shaw, Liz, Michael Nunns, Simon Briscoe, Amelia Mosley, Daniel Dalton, Rob Anderson, and Jo Thompson Coon. Evidence for specialist treatment of people with acquired brain injury in secure psychiatric services: systematic review and narrative synthesis. NIHR, August 2020. http://dx.doi.org/10.3310/hsdr-tr-130320.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Calatayud, Agustina, and Paul Constance. A roadmap to the mobility and logistics trends that are reshaping Latin America and the Caribbean. Inter-American Development Bank, August 2022. http://dx.doi.org/10.18235/0004413.

Повний текст джерела
Анотація:
Today, governments are acutely aware that merely building new infrastructure is not the solution, and they are seeking the IDB Groups assistance in designing smarter transportation services that will meet their peoples expectations. This document describes the five broad shifts that are driving the IDB Groups transportation portfolio: (i) the social dimension of transportation services; (ii) new institutional and regulatory arrangements; (iii) logistics performance; (iv) secure resources for maintaining transport infrastructure, and (v) the digital transformation.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hoffman, P. SMTP Service Extension for Secure SMTP over TLS. RFC Editor, January 1999. http://dx.doi.org/10.17487/rfc2487.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Reiter, Michael, and Kenneth Birman. How to Securely Replicate Services. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada252952.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chandramouli, Ramaswamy, and Zack Butcher. Building secure microservices-based applications using service-mesh architecture. Gaithersburg, MD: National Institute of Standards and Technology, May 2020. http://dx.doi.org/10.6028/nist.sp.800-204a.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії