Showing 1,541 - 1,560 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1541

    Conditioned secure access control model based on multi-weighted roles and rules in workflow system

    Published 2008-01-01
    “…The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control model) was proposed on the basis of multi-weighted roles and rules. …”
    Get full text
    Article
  2. 1542
  3. 1543
  4. 1544
  5. 1545
  6. 1546
  7. 1547

    Water insecurity is human: why social science must be at the core of water security research and practice by Amber Wutich

    Published 2025-01-01
    “…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
    Get full text
    Article
  8. 1548

    Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City) by Parvin Daneshvar, Taghiloo Ali Akbar, Hassan heydari

    Published 2023-06-01
    “…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
    Get full text
    Article
  9. 1549

    A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid by Nabil Tazi Chibi, Omar Ait Oualhaj, Wassim Fassi Fihri, Hassan El Ghazi

    Published 2024-01-01
    “…This paper presents a new approach that integrates Machine Learning (ML), Blockchain Technology (BT), and Markov Decision Process (MDP) to improve the security of SG networks while ensuring accurate storage of events reported by various network devices through BT. …”
    Get full text
    Article
  10. 1550
  11. 1551

    The role of international support programmes in global health security capacity building: A scoping review. by Anne Doble, Zoe Sheridan, Ahmed Razavi, Anne Wilson, Ebere Okereke

    Published 2023-01-01
    “…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
    Get full text
    Article
  12. 1552

    Solution of secure multi-party multi-data raking problem based on El Gamal encryption by LIU Wen1, LUO Shou-shan2, CHEN Ping4

    Published 2007-01-01
    Subjects: “…secure multi-party multi-data rank…”
    Get full text
    Article
  13. 1553
  14. 1554

    THE RELATIONSHIP OF WOMEN WORKERS WITH DEVELOPMENT FROM THE PERSPECTIVE OF GAINING THEIR ECONOMIC FREEDOM AND SECURING THE FUTURE OF THEIR CHILDREN by Bediha Şahin

    Published 2023-03-01
    “…According to the results of the research, it has been detected that the participating women workers entered business life due to compulsory reasons, gained their economic freedom and stood on their own feet, it was effective that they worked to secure the future of their children and earned money, that they loved their job very much and were satisfied with their work. …”
    Get full text
    Article
  15. 1555
  16. 1556
  17. 1557

    Enhanced airport security screening under fermatean probabilistic hesitant fuzzy hybrid aggregation information by Wania Iqba, Shahziab Ashraf, Maria Akram, Muhammad Shazib Hameed

    Published 2024-06-01
    “…Optimizing airport security screening processes is imperative in the modern age, ensuring a delicate balance between stringent security measures and efficient, seamless travel experiences for passengers. …”
    Get full text
    Article
  18. 1558
  19. 1559

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. …”
    Get full text
    Article
  20. 1560