排序方式: 共有90条查询结果,搜索用时 35 毫秒
11.
A. Srivastava 《Computer Law & Security Report》2009,25(5):432-446
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance. 相似文献
12.
介绍了汽车用燃气加气站地下储罐的置换和试压方法 ,对地下储罐系统试压方法的经济性进行了分析 相似文献
13.
Paul HintonAuthor VitaeEdwin BakerAuthor Vitae Chris HillAuthor Vitae 《Computer Law & Security Report》2012
While latency issues have always existed in IT systems, it is only in recent years that latency has become a significant focal point for both IT suppliers and customers. This paper will provide an overview as to how latency arises in IT systems, why latency is becoming important across a variety of business sectors and then explores some of the prominent legal issues inherent in contracting for low-latency solutions. 相似文献
14.
应用组织化学方法在组织和细胞水平上对碱性磷酸酶、酸性磷酸酶、过氧化氢酶以及三磷酸腺苷酶在蛋鸡输卵管内的分布特点及分布意义进行了研究分析。结果显示,4种酶在蛋鸡输卵管各段的分布部位以及反应强弱存在差异。碱性磷酸酶在子宫部分布最多,在有精子储存的黏膜固有层腺体和血管周围也有明显分布;酸性磷酸酶在阴道子宫交界部分布最多,酸性磷酸酶阳性反应呈颗粒状,主要分布于黏膜上皮和固有层腺体;过氧化氢酶在输卵管各段血管周围以及子宫阴道交界处精子腺和蛋白分泌部反应明显;三磷酸腺苷酶在各段尤其是子宫阴道交界处精子腺部位黏膜上皮纤毛和腺体分布较多,血管也有一定分布。表明这些酶在精子储存时对精子的活性和储存环境的维持、物质运输及分泌等活动具有一定的生物学作用。 相似文献
15.
本文从西部地区资源结构的特征出发 ,将资源分为两大类 :存量资源和流量资源 ,并对存量资源与流量资源的优劣势进行了比较分析 ,指出了存量优势与流量优势的不同效率 ,并在客观分析资源开发中的现实问题的基础上 ,提出了西部地区资源优势转化的战略新思路。 相似文献
16.
The global ubiquity of cloud computing may expose consumers' sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers' trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive information in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry. 相似文献
17.
A review of articles in the technical media between 2005 and 3Q 2011 disclosed reports on 49 outages involving 20 cloudsourcing providers. Several of these were major events. Many caused difficulties for user-organisations’ staff. Some caused lengthy suspension of services by user-organisations to their customers. A number of them involved irretrievable loss of data. Many user-organisations have failed to risk-assess their use of cloudsourcing, and are exposing their businesses to unmanaged risks. 相似文献
18.
The rise of virtualisation and cloud computing is one of the most significant features of computing in the last 10 years. However, despite its popularity, there are still a number of technical barriers that prevent it from becoming the truly ubiquitous service it has the potential to be. Central to this are the issues of data security and the lack of trust that users have in relying on cloud services to provide the foundation of their IT infrastructure. This is a highly complex issue, which covers multiple inter-related factors such as platform integrity, robust service guarantees, data and network security, and many others that have yet to be overcome in a meaningful way. This paper presents a concept for an innovative integrated platform to reinforce the integrity and security of cloud services and we apply this in the context of Critical Infrastructures to identify the core requirements, components and features of this infrastructure. 相似文献
19.
In this work, we describe our experiences in developing cloud forensics tools and use them to support three main points:First, we make the argument that cloud forensics is a qualitatively different problem. In the context of SaaS, it is incompatible with long-established acquisition and analysis techniques, and requires a new approach and forensic toolset. We show that client-side techniques, which are an extension of methods used over the last three decades, have inherent limitations that can only be overcome by working directly with the interfaces provided by cloud service providers.Second, we present our results in building forensic tools in the form of three case studies: kumodd–a tool for cloud drive acquisition, kumodocs–a tool for Google Docs acquisition and analysis, and kumofs–a tool for remote preview and screening of cloud drive data. We show that these tools, which work with the public and private APIs of the respective services, provide new capabilities that cannot be achieved by examining client-side artifacts.Finally, we use current IT trends, and our lessons learned, to outline the emerging new forensic landscape, and the most likely course of tool development over the next five years. 相似文献
20.
由法律的理性与历史性考察看法学的思考方式 总被引:2,自引:0,他引:2
法律既包含理性要素,也包含一个时间(历史)要素。每一个具体的实在法都必然经历一个物理的时间过程。在这个过程中,实在法不断在生成、发展、变更或消灭,同时法律的理性也随之展现出形态差异的面貌。只有在历史演进的过程中,我们才会逐渐获得有关法律之理性的较为完整清晰的图景。 相似文献