Showing 1 - 10 results of 10 for search '"access control"', query time: 0.08s Refine Results
  1. 1

    Fuzzy Group Decision Making Model for Identifying and Ranking of Success Factors in Fraud Prevention in Iranian E-banking by Alireza Alizadeh, Mehri Chehrehpak

    Published 2017-06-01
    “…Fraud in e-banking is due to some security problems (such as weakness in access control systems and inadequate internal control). …”
    Get full text
    Article
  2. 2

    Comparison and Evaluation of Cloud-based Storage Software for Use in Archives: Offer appropriate software for internal archive centers by Abdolreza Izadi, Abdolhossein Farajpahlou

    Published 2020-05-01
    “…On the features of software cloud storage, Encryption, file sharing, access control and backup had the most support; The biggest weakness of the statistical softwares in this area is the weakness in the version control feature. …”
    Get full text
    Article
  3. 3

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…The paradigm imposes encrypted access control, along with specific enhanced access capabilities. …”
    Get full text
    Article
  4. 4

    Information security of Web-based systems in Iran Institution of public libraries by morteza kokabi, mansor kohi rostami

    Published 2015-06-01
    “…Evaluation criteria includes: Security Policy; Organization of information security; Asset management; human resources security; physical and environmental security; communications and operations management; access control; Information systems acquisition, development and maintenance; Information security incident management; business continuity management, and compliance. …”
    Get full text
    Article
  5. 5

    A Narrative Review of Blockchain in Healthcare: Applications and challenges by Zahra Anvari Sadi, Aliasghar Safaei

    Published 2022-12-01
    “…Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockchain in healthcare. …”
    Get full text
    Article
  6. 6

    A Systematic Review of Intrusion Detection using Hidden Markov Models: Approaches, Applications, and Challenges by Ali Ahmadian Ramaki, Abbas Rasoolzadegan, Abbas Javan Jafari

    Published 2018-06-01
    “…Apart from using traditional security solutions in software systems such as cryptography, firewalls and access control mechanisms, utilizing intrusion detection systems are also necessary. …”
    Get full text
    Article
  7. 7

    Visualization and Analysis of Conceptual Network of Information Security by Adeleh Ahangar, Fahimeh Babalhavaeji, Molouk Sadat Hosseini Beheshti, Nadjla Hariri, Maryam Khademi

    Published 2021-12-01
    “…The most important concepts of this network with the highest betweenness centrality are “Security”, “Information Security”, “Information Systems”, “Privacy”, “Information” “Telecommunication, “Encryption” and “Cryptography”, “Authentication”, “Cyber security”, “Network”, “Cloud Computing”, “Security Attacks”, “Access Control”, “Intrusion Detection Systems (IDS)”, “Security Protocols”, “Risk”, “Risk Management and its Frameworks”, and “Service Level Agreement (SLA)”. …”
    Get full text
    Article
  8. 8

    Assessing the Security Status of Picture Archiving and Communication Systems (PACS) of Kerman University of Medical Sciences to Record Data of COVID-19 Patients by Mahdieh Montazeri, Hamidreza Naji, Asma Janati

    Published 2021-03-01
    “…Conclusion: The security status of PACS has weaknesses and it seems necessary to plan so as to develop the necessary laws regarding the security of access to data of patients with COVID-19 and its observance by system support companies, user training, access control, and risk management.…”
    Get full text
    Article
  9. 9

    A proposed framework technical requirements copyright protection for information resources in NLAI information systems: with Fuzzy Delphi Technique by زینب پاپی

    Published 2023-12-01
    “…Network Security; standards and frameworks; Authentication; digital reading tools; digital preservation; payment systems; rights metadata; access control; copy control; License; Digital repository and transfer have formed 12 components of preventive technical requirements. …”
    Get full text
    Article
  10. 10

    Investigating the effect of residential user criteria in the reduction of Crime in Metropolis of Tabriz by seyedeh parastoo bahernia, Hossein Nazmfar, Belal Mohsenzadeh

    Published 2020-04-01
    “…Conclusion Based on the results of the present study on the effect of planned and social and security planning and residential measures on residential use reduction patterns in such places and in line with the theories and results of the mentioned research, it can be understood that due to population expansion And the lack of land to build residential areas in metropolitan areas, along with changing people's lifestyles and the increase in apartment living due to the consequences of modernity, as well as the advancement of technology and construction of towers and skyscrapers in metropolitan areas; For the construction of such residential premises in addition to construction and Legal instruments and attention to building strength and safety; in consultation with environmental criminologists and exchanging views with them, it is necessary to provide expert expertise in physical dimensions such as access control - environmental quality - natural monitoring and domination; social such as threshold capacity and social solidarity between Residents should consider preventing and preventing the occurrence of crime in such units. …”
    Get full text
    Article