Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Secure forwards

In this paper, we use three criteria to measure security forward confidentiality, backward confidentiality and collusion problem. As we know, static SDR maintains forward ackward confidentiality, and has no collusion problem. We find that those properties hold for dynamic SDR. [Pg.24]

Remark 10.11 (Security for the signer forwards). Currently, security for the signer backwards has been assumed in the one-time scheme and proved in the new scheme. If one wanted to obtain a similar theorem for security forwards, one would have to increase the parameter a in Construction 10.9 by adding log2(iV). because the attacker has more chances to come into a situation where he can make an improvable successful forgery. The same holds for the following constructions. ... [Pg.325]

A good example of how transparency and information diffusion can enhance supply security is secondary trading of transmission pipeline capacity in North America (US and Canada). Secondary trading not only improves the utilization of capacities, but also provides a way to secure forward deals in the natural gas market by eliminating the transportation risk. The US experience shows that secondary trading leads to liquid markets, a more-efficient use of the infrastructure, and a significantly increased supply security. [Pg.9]

Migrating only the raw data - the characters, numbers, bits, and bytes - forward is not enough to ensure usability. The meta data and the context for the application or database must also be migrated forward. Meta data are the code to the machine-stored bits and bytes. Meta data are the data about the data. They describe the data in the database. The meta data documentation describes the method of data capture, the application used to access the data, security rules for the tables and columns, and other descriptive and procedural information. For derived or calculated data, the algorithm or protocol that was used must be known. The documentation then becomes something else that must be preserved. Without the meta data, the reader will only see a series of alphabetic characters. Without the entire described context associated with the data, the data have no meaning. [Pg.1064]

Implementation ofthe MOX option for disposition of much ofthe U.S. and Russian surplus weapons plutonium is an important international security goal. It should go forward with international participation in MOX fabrication and irradiation in order to realize the earliest possible start and avoid potentially prohibitory U.S. political and regulatory obstacles. [Pg.125]

Back Forward Reload Homo Search Guide Images Print Security Stop... [Pg.627]

It is apparent that the need for a secure supply of mineral commodities is currently driving some countries, and forward-thinking companies, to continue to acquire, prospect for, evaluate, and enter into feasibility studies of, potential near-term mining properties. In some cases, properties are being prepared for immediate production by either completing construction of mining infrastructure or by expansion of existing mine and mill capacities. The idea is to have a property ready to increase production or to be put into production when commodity prices rebound, and to do so more quickly than... [Pg.133]

As a result of all these changes, a long life has become something to look forward to rather than dread. Many of today s retirees are younger, healthier, and more financially secure than their predecessors. Their children are reared, their careers are complete, and they are ready to enjoy the fruits of their labors. With careful planning, they can make these years the best years of their lives. [Pg.4]

In the USA, research and development is heavily focused on the security of the energy supply, and the large native reserves of coal and oil shale could be used for the manufacture of sulphur-free, synthetic fuels, which could be used in existing internal combustion engine technologies. This would seem a likely way forward for vehicle propulsion, although the ultimate direction will be dictated by environmental and political considerations. [Pg.104]

The CII is characterized by some very specific traits, which has to be appraised in order to plan adequate solutions to the critical security issues. Some of these traits result from the CII implementation others are requirements put forward by the CII users, which shape its development by explicitly demanding (e.g., quality of service contracts) or implicitly expecting some qualities. [Pg.65]

There is only one way forward the future decentralized energy generation demands joint action of specialists on computer systems and power engineering. The future lies in environmentally sustainable, secure energy sources. [Pg.96]

Availability emerges as a top-priority security requirement. A proper implementation has two parts a prompt deployment and a constant ability to sense the environment and forward traffic. In the traditional computer security, secrecy is associated with controlling who gets to read information. In the field of distributed sensor networks, the situation is different. The network itself may act as an intruder. In this case, the size of the nodes becomes an important design metric. Short range, multihop communication is also the prudent course of action. [Pg.178]

For that purpose a secure timeserver is introduced. In this role an agent running within the platform is acting. The time agent supports two modes of operation as described in [1] forward-time hash function and backward-time hash function. The forward-time constructions permit key generation only after a given time. And the backward-time constructions permit key generation only before it. [Pg.339]

The proposed secure personal content delivery protocol does not use time construction by default. There are additional steps required in the protocol. Let TA denotes the Time Agent and s denotes the secret belonging to the Time Agent. In order to use forward-time hash function constructions the protocol has the following steps ... [Pg.340]

It is critical to the success of the implementation and continued maintenance of a quality program that management commitment is constantly visible to the company s employees. Management that clearly support quality by way of leadership and adequate resource allocation is more likely to secure and retain committed and enthusiastic employees. Executive management that does not walk the talk is likely to be viewed as duplicitous and not genuinely committed to the corporate quality mission. Employees should be encouraged to become involved and take ownership of compliance enhancements and continuous improvements in their specific areas. Individual personnel efforts should be directed by the company s overall program of continuous improvement and forward quality. [Pg.442]

The dog is placed on an undersheet and its head is secured by an assistant. The upper and lower jaws are separated by exerting pressure on the Ups with both hands. The stomach tube moistened with mains water is introduced into the open throat. Caution do not introduce the tube in the trachea. Pour mains water into the glass funnel fitted on the stomach tube over the nonreturn valve to check that the tube is correctly positioned. If outflow difficulties occur, adjust the position of the tube by moving it slightly backwards and forwards. Then introduce the test substance to be administered. Then rinse the tube and remove. [Pg.561]


See other pages where Secure forwards is mentioned: [Pg.169]    [Pg.180]    [Pg.95]    [Pg.136]    [Pg.117]    [Pg.415]    [Pg.133]    [Pg.362]    [Pg.756]    [Pg.888]    [Pg.123]    [Pg.2]    [Pg.104]    [Pg.346]    [Pg.481]    [Pg.517]    [Pg.610]    [Pg.654]    [Pg.954]    [Pg.516]    [Pg.154]    [Pg.360]    [Pg.62]    [Pg.141]    [Pg.43]    [Pg.81]    [Pg.248]    [Pg.51]    [Pg.52]    [Pg.177]    [Pg.342]    [Pg.153]    [Pg.406]    [Pg.515]   
See also in sourсe #XX -- [ Pg.174 ]




SEARCH



Forward

Forwarder

© 2024 chempedia.info