Showing 5,101 - 5,120 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 5101

    Access control model based on trusted computing for integrated avionics system by CUI Xi-ning1, 2, SHEN Yu-long1, MA Jian-feng1

    Published 2009-01-01
    “…Integrated avionics system is a highly integrated and modularized system.It strongly requires the reliability of platform, the confidentiality and integrity of information.Software alone does not provide an adequate foundation for building a high-assurance trusted platform.The access control policies based on trusted hardware and trusted computing technologies were focused.By using BLP model and BIBA model, an access control model was brought for ensuring the confidentiality and integrity of information, which greatly improved integrated avionics system’s security.…”
    Get full text
    Article
  2. 5102

    Central Bank Digital Currencies: Benefits, Risks and the Role of Blockchain Technology by Jonas Groß, Manuel Klein, Philipp Sandner

    Published 2020-07-01
    “…The main motives are higher financial stability, higher security and efficiency of payment systems and a higher degree of automation of business processes. …”
    Get full text
    Article
  3. 5103

    Analysis and enlightenment on the cybersecurity strategy of various countries in the world by Yu-xiao LI, Yong-jiang XIE

    Published 2016-01-01
    “…National cybersecurity strategy is the top-level design and strategic framework of the country, which in-cludes the national security, risk management and the personal protection. …”
    Get full text
    Article
  4. 5104

    Survey of block chain by Xin SHEN, Qing-qi PEI, Xue-feng LIU

    Published 2016-11-01
    “…,block chain has attracted more and more attentions from financial institutions.The essential theory and core technique of block chain were surveyed,and the issues of management and security problems of block chain based applications were discussed.To help improve the block chain techniques is the goal.…”
    Get full text
    Article
  5. 5105

    Biosecurity and Biological Risk Management for Livestock Enterprises by Matt Hersom, Max Irsik, Todd Thrift

    Published 2008-04-01
    “… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
    Get full text
    Article
  6. 5106

    Machine learning models and methods for solving optimization and forecasting problems of the work of seaports by M. N. Lukashevich, M. Y. Kovalyov

    Published 2022-12-01
    “…A special attention is paid to the port planning and development a wide range of topics in port operations, including port planning and development, their safety and security, water and land port operations.…”
    Get full text
    Article
  7. 5107

    Adoption of Drone Technology for the Smart Safety Mechanism of Women by Victoria Nozick

    Published 2022-09-01
    “…These DRONES helps them to keep secure and do all the patrol or Police work during nights.…”
    Get full text
    Article
  8. 5108

    The conservation of a 19th century framed miniature portrait painted on ivory by Violeta Machado Prin

    Published 2018-05-01
    “…The object was in poor condition, with all the pieces necessary to hold the object separated and with the attempt of securing these parts with brown and clear adhesive tape. …”
    Get full text
    Article
  9. 5109

    On the optimal exercise boundary for an American put option by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…An American put option is a derivative financial instrument that gives its holder the right but not the obligation to sell an underlying security at a pre-determined price. American options may be exercised at any time prior to expiry at the discretion of the holder, and the decision as to whether or not to exercise leads to a free boundary problem. …”
    Get full text
    Article
  10. 5110

    CONSUMER BEHAVIOR TOWARDS NEW FINANCIAL TECHNOLOGIES: AN ANALYSIS OF THE ADOPTION OF DIGITAL BANKING SERVICES by NIOATA (CHIREAC) ROXANA-MIHAELA

    Published 2024-12-01
    “…The study explores how risk perception, trust in digital security, familiarity with technology and convenience preferences influence the decision to use online or mobile banking solutions. …”
    Get full text
    Article
  11. 5111

    Darknesses over the Bistrica. On some unacceptable interpretations of the history of Prizren and its monuments by Vojvodić Dragan, Pirivatrić Srđan

    Published 2023-01-01
    “…It is shown that those views and opinions have no basis in the sources and are a result of unsound methodology and ignoring securely ascertained facts in a bid to reshape tendentiously the image of the past.…”
    Get full text
    Article
  12. 5112

    Technology research and construction scheme of unified data lake by Zhiyong LIU, Zhongjiang HE, Jinglong LIU, Yilong RUAN, Zhaofang MENG

    Published 2021-01-01
    “…From the requirements of enterprise digital transformation and the challenges faced by big data platform, the construction ideas and principles of unified data lake were expounded.A unifid data lake construction scheme based on BSS/MSS/OSS cross domain fusion was proposed, which adopted logical unification, physical dispersion, unified data directory, unified security management and application of decoupling fusion.The construction practice of unified data lake was described in recent two years.…”
    Get full text
    Article
  13. 5113

    Korean Brinkmanship, American Provocation, and the Road to War: The Manufacturing of a Crisis by Tim Beal

    Published 2010-12-01
    “…The exchange of artillery fire between South and North Korea on 23 November, 2010 had predictable results - a great increase of tension on the peninsula, a show of force by the United States, and a torrent of uninformed media articles and pontificating from the security industry.Tim Beal probes the historical background to the recent incident that has brought the two Koreas, as well as the United States and China, to the brink of a new Korean War, and what can be done to address the issues.…”
    Get full text
    Article
  14. 5114

    Analytical and scientific support mechanism of the US foreign policy process by I. A. Istomin

    Published 2009-12-01
    “…The U.S. intellectual leadership in many spheres is rarely challenged nowadays. However it is secured not only through the ability to formulate a great amount of new ideas, including fundamental innovations, but perhaps even more due to the effective system for integration of intellectual products into practice. …”
    Get full text
    Article
  15. 5115

    Bayes decision theory based risk minimization authorization mapping by Bin ZHAO, Jing-sha HE

    Published 2015-11-01
    “…Authorization decision was one of the key issues in the control access.In order to effectively enhance the security of authorization in trust based access control authorization,according to minimization risk Bayes decision theory,authorization was the object to the subject in access control as found that the problem of optimal decision.A method that minimizates risk based authorization mapping to realize correct authorization operation in the access control was proposed.Example analysis and simulation experiment show that the method is able to reduce risk accurately to interaction final authorization.…”
    Get full text
    Article
  16. 5116

    Les risques du journalisme dans les conflits armés by Aimé-Jules Bizimana

    Published 2006-11-01
    “…The resurgence of attacks on the security of journalists during the recent conflict in Iraq opened a debate on the conditions under which the profession can be exercised in situations of armed conflict. …”
    Get full text
    Article
  17. 5117

    Biosecurity and Biological Risk Management for Livestock Enterprises by Matt Hersom, Max Irsik, Todd Thrift

    Published 2008-04-01
    “… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
    Get full text
    Article
  18. 5118

    Respite Care for Caregivers of Older Adults by Suzanna Smith

    Published 2012-08-01
    “…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
    Get full text
    Article
  19. 5119

    Efficient anonymous reputation-based revocation without TTP by Li XI, ENGDeng-guo F

    Published 2014-07-01
    “…The security problems in PE(AR)<sup>2</sup>are pointed out then a new TTP-free scheme is proposed to supports anony-mous reputation-based revocation. …”
    Get full text
    Article
  20. 5120

    ECOLOGICALLY ORIENTED MATHEMATICAL MODELS OF RISK MANAGEMENT AND SAFETY by I. Gvozdkova

    Published 2016-09-01
    “…Recommendations on the implementation and development of eco-friendly models in the interests of rational nature management, resource saving, human security and natural-anthropogenic complexes are formulated.…”
    Get full text
    Article