Results 1 - 10
of
2,956
Security provision in
, 2010
"... Surveying public opinion In July 2006, following a series of crossborder incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing campaign in Southern Lebanon. 1 During the campaign, Israel fired more than 100,000 ..."
Abstract
- Add to MetaCart
and individuals in Southern Lebanon? Quantitative and qualitative research on arms, armed groups, and security provision in Southern Lebanon is extremely limited. Local sensitivities Amal militants take cover and trade fire with government-aligned Sunni forces during the opposition‘s siege of Beirut in May 2008
Simulation for Security Provision, Attack Assessment and
, 2002
"... Security provision for protection when employing simulators over the Internet, becomes daily more important for protection of data and operations. This paper identifies the two major activities of registration and message (data) passing. Encryption and decryption are discussed along the issues assoc ..."
Abstract
- Add to MetaCart
Security provision for protection when employing simulators over the Internet, becomes daily more important for protection of data and operations. This paper identifies the two major activities of registration and message (data) passing. Encryption and decryption are discussed along the issues
Secure Routing for Mobile Ad Hoc Networks
- MOBILE COMPUTING AND COMMUNICATIONS REVIEW
, 2002
"... For such self-organizing infrastructures as mobile ad hoc
networks , envisioned to operate in an open, collaborative,
and highly volatile environment, the importance of secu-
rity cannot be underrated. The provision of comprehen-
sive secure communication mandates that both route dis-
covery and dat ..."
Abstract
-
Cited by 599 (14 self)
- Add to MetaCart
For such self-organizing infrastructures as mobile ad hoc
networks , envisioned to operate in an open, collaborative,
and highly volatile environment, the importance of secu-
rity cannot be underrated. The provision of comprehen-
sive secure communication mandates that both route dis-
covery
Search, Self-Insurance and Job-Security Provisions
, 1998
"... We construct a general equilibrium model to evaluate the quantitative e¤ects of severance payments in the presence of contracting and reallocational frictions. Key elements of the model are: 1) establishment level dynamics, 3) imperfect insurance markets, and 4) variable search decisions. Contrary ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We construct a general equilibrium model to evaluate the quantitative e¤ects of severance payments in the presence of contracting and reallocational frictions. Key elements of the model are: 1) establishment level dynamics, 3) imperfect insurance markets, and 4) variable search decisions. Contrary to previous studies that analyzed severance payments in frictionless environments, we …nd that severance payments reduce unemployment, produce negative insurance e¤ects and improve welfare levels.
1www.lebanon-violence.org Security provision in
, 2010
"... border incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing cam- ..."
Abstract
- Add to MetaCart
border incursions by Hezbollah into Israeli territory and the capture of two Israeli Defence Forces (IDF) personnel, Israel initiated a 24-day bombing cam-
Xen and the art of virtualization
- IN SOSP
, 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract
-
Cited by 2010 (35 self)
- Add to MetaCart
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security
Resource-aware self-adaptive security provisioning in mobile ad hoc networks
- Wireless Communications and Networking Conference, 2005 IEEE
, 2005
"... Abstract-Providing satisfactory security services in Mobile Ad Hoc Network (MANET) is indispensable to their mission critical applications; however, often a highly secure mechanism inevitably consumes a rather large amount of system resources, which in turn may unintentionally cause a security prov ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
provisioning Denial of Service (SPDoS) attack. To avoid SPDoS attack, this paper sets out a framework to design a resource-aware self-adaptive network security provisioning scheme for the resource constraint MANET. With the support of the offline optimal secure protocol selection module and the online self
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
"... Abstract. Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, effective security mechanisms can be quite different from those typically deployed in conventional applications ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
the residual damage and the cost of security provisioning. We propose the use of workflow profiles to capture the contexts in which a communication channel is used in a pervasive environment. This is used to minimize the cost that the underlying business entity will have to incur in order to keep the workflow
Secure Provision of Reactive Power Ancillary Services in Competitive Electricity Markets
"... ©Ismael El-Samahy, 2008I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. The research work presented in thi ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive
Safety technologies impacts survey in M-services security provision 1
"... Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the m- se ..."
Abstract
- Add to MetaCart
- services area is the security issue. Different papers have discussed various aspects of secured networks. But, until now a extensive ranking approach has not been presented to overcome the security issues. In this paper, first the security technologies and their applications have reviewed. Then the future
Results 1 - 10
of
2,956