Showing 1,521 - 1,540 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1521
  2. 1522
  3. 1523

    Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans by N.G.N. Renti Maharaini Kerti

    Published 2024-10-01
    Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
    Get full text
    Article
  4. 1524

    Farmers-Herders Conflict and Nigeria’s Quest for Food Security: The Imperative Need for Information Communications Technology by Olawale Olufemi Akinrinde, Abdullahi Abdullazeez Osuwa, Kayode Wakili Olawoyin

    Published 2021-12-01
    “…In recent times, many scholarly studies and inquiries on the impact of Information Communications Technology, particularly with respect to promoting food security in Nigeria, have been engendered mainly by the need to ensure greater agricultural outputs among farmers and other agriculturists. …”
    Get full text
    Article
  5. 1525

    Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model by Shariq Hussain, Haris Anwaar, Kashif Sultan, Umar Mahmud, Sherjeel Farooqui, Tehmina Karamat, Ibrahima Kalil Toure

    Published 2024-01-01
    “…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
    Get full text
    Article
  6. 1526
  7. 1527
  8. 1528
  9. 1529

    Conditioned secure access control model based on multi-weighted roles and rules in workflow system

    Published 2008-01-01
    “…The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control model) was proposed on the basis of multi-weighted roles and rules. …”
    Get full text
    Article
  10. 1530
  11. 1531
  12. 1532
  13. 1533
  14. 1534
  15. 1535

    Water insecurity is human: why social science must be at the core of water security research and practice by Amber Wutich

    Published 2025-01-01
    “…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
    Get full text
    Article
  16. 1536

    Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City) by Parvin Daneshvar, Taghiloo Ali Akbar, Hassan heydari

    Published 2023-06-01
    “…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
    Get full text
    Article
  17. 1537

    A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid by Nabil Tazi Chibi, Omar Ait Oualhaj, Wassim Fassi Fihri, Hassan El Ghazi

    Published 2024-01-01
    “…This paper presents a new approach that integrates Machine Learning (ML), Blockchain Technology (BT), and Markov Decision Process (MDP) to improve the security of SG networks while ensuring accurate storage of events reported by various network devices through BT. …”
    Get full text
    Article
  18. 1538
  19. 1539

    The role of international support programmes in global health security capacity building: A scoping review. by Anne Doble, Zoe Sheridan, Ahmed Razavi, Anne Wilson, Ebere Okereke

    Published 2023-01-01
    “…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
    Get full text
    Article
  20. 1540

    Solution of secure multi-party multi-data raking problem based on El Gamal encryption by LIU Wen1, LUO Shou-shan2, CHEN Ping4

    Published 2007-01-01
    Subjects: “…secure multi-party multi-data rank…”
    Get full text
    Article