Academic literature on the topic 'Security solution'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security solution.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security solution"

1

Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of t
APA, Harvard, Vancouver, ISO, and other styles
4

Tyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Full text
Abstract:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret
APA, Harvard, Vancouver, ISO, and other styles
6

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
APA, Harvard, Vancouver, ISO, and other styles
7

Stashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.

Full text
Abstract:
The article identifies the essence of the concept of banking innovations and their role in the financial security of banking institutions. Features of development of technological banking innovations in Ukraine, including in the conditions of influence of COVID-19 are considered. The characteristics of banking innovations are considered, the criteria to be met by banking innovations both on the part of the client and on the part of the bank are identified. The classification of banking innovations according to such features as: by time aspect, by novelty, by causes of occurrence, by volume of
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.

Full text
Abstract:
In today's digital age, data storage has become an increasingly important issue. The exponential growth of data has led to the need for secure and private storage solutions. Unfortunately, without a standardized protocol, the security and privacy of sensitive data can be a challenge. However, blockchain technology has emerged as a promising solution for secure data storage. Blockchain's decentralized and immutable nature provides a comprehensive solution for the security and privacy of all types of data. In this research, we propose an innovative framework that leverages the benefits of blockc
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security solution"

1

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Full text
Abstract:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
APA, Harvard, Vancouver, ISO, and other styles
2

Hensley, Katrina Ludden Fredrick. "ATM security via "Stargate" solution /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA370810.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Geoffrey G. Xie. Includes bibliographical references (p. 71-72). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Hensley, Katrina, and Fredrick Ludden. "ATM security via "Stargate" solution." Thesis, Monterey, California: Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13683.

Full text
Abstract:
Approved for public release, distribution unlimited.<br>In today's world of integrating voice, video and data into a single network, Asynchronous Transfer Mode (ATM) networks have become prevalent in the Department of Defense. The Department of Defense's critical data will have to pass through public networks, which causes concern for security. This study presents an efficient solution aimed at authenticating communications over public ATM networks. The authenticating device, Stargate, utilizes a high speed, low level authentication protocol that offers the low cost, flexibility, and extensibi
APA, Harvard, Vancouver, ISO, and other styles
4

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.

Full text
Abstract:
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led to a huge increase in the number of security tools available in theindustry. The result of the increase is that that companies often do not know in whichsoftware to invest in order to meet their security needs. The purpose of this thesis isto address this problem by developing a solution that helps companies to choose theright security software based on their security needs and that allows to do the se
APA, Harvard, Vancouver, ISO, and other styles
6

Ng, Yu Loon. "Short Message Service (SMS) security solution for mobile devices." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FNg%5FYu.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Gurminder Singh, John Gibson. "December 2006." Includes bibliographical references (p. 91-94). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Somasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.

Full text
Abstract:
Business Intelligence is a set of tools and applications that are widely deployed across major corporations today. An appropriate translation for “Business Intelligence” in Swedish is “beslutstöd”, and it clearly describes the purpose of such a solution, andt hat is to collect, compress, consolidate and analyze data from multiple sources, so that critical decisions can be made based on it hence the name “beslutstöd. The focusof Business Intelligence has been on business data, so that trends and patterns of sales, marketing, production and other business areas can be studied. In addition, based
APA, Harvard, Vancouver, ISO, and other styles
8

Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.

Full text
Abstract:
The application of quantum cryptographic methods to existing communications infrastructures can be extremely difficult owing to the complex nature of quantum transmission methods. The premise of this thesis is an examination of methods to combine quantum-safe security with standard protocols, such as phase shift keying. Use is made of an algorithm previously presented by Ueli Maurer which allows for the distillation of a mutual symmetric cryptographic key from some shared secret information (Maurer, 1993). This algorithm is examined extensively and incorporated into a complete protocol which c
APA, Harvard, Vancouver, ISO, and other styles
9

Rajendran, Ashok. "Security Analysis of a Software Defined Wide Area Network Solution." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190193.

Full text
Abstract:
Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the networking service and eases the complexity of conguring and managing the enterprise network by moving t
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Full text
Abstract:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security solution"

1

author, Nguyen Hung, Romero Stephanie author, Levison Jakob author, and Selga Dominici author, eds. WordPress: Brute security & Bot defense solution. National University, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Astutiningtyas, Elisabeth Tri. Energy poverty: Fact & solution. IESR, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute for Essential Services Reform. Energy poverty: Fact and solution. Institute for Essential Services Reform, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mourani, Gerhard. Securing & optimizing Linux: The ultimate solution. Open Network Architecture Inc., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beard, Sam. Restoring hope in America: The social security solution. Institute for Contemporary Studies, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

American Bar Association. Standing Committee on Law and National Security. and American Bar Association Meeting, eds. National security leaks: Is there a legal solution?. American Bar Association, Standing Committee on Law and National Security, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

International Business Machines Corporation. International Technical Support Organization, ed. Designing for solution-based security on z/OS. IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joe, McGraw, and Lauchengco Duane, eds. The sovereignty solution: A common sense approach to global security. Naval Institute Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Security, Inter-American Conference on Social. Financing problems and options for a solution: The Americas social security report, 2002. Inter-American Conference on Social Security, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security solution"

1

Welsh, Sean. "Solution design." In Ethics and Security Automata. Routledge, 2017. http://dx.doi.org/10.4324/9781315168951-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Neelakrishnan, Priyanka. "Data Security Solution Design." In Autonomous Data Security. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0838-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Weijia, and Tej Anand. "Security Considerations." In Blockchain and Ethereum Smart Contract Solution Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8164-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Haomiao, Hongwei Li, and Xuemin Sherman Shen. "Complete ADS-B Security Solution." In Secure Automatic Dependent Surveillance-Broadcast Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07021-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thomas, Shince, Devesh Misra, P. R. Lakshmi Eswari, and N. Sarat Chandra Babu. "A Transparent End-to-End Security Solution." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hernandez Fernandez, Javier, Aymen Omri, and Roberto Di Pietro. "PLC Network Integrity Solution." In Physical Layer Security in Power Line Communications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57349-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chorghe, Sharvari Prakash, and Narendra Shekokar. "A Solution to Detect Phishing in Android Devices." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, SuGil, Kwangjo Kim, and ByeongGon Kim. "Practical Solution for Location Privacy in Mobile IPv6." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Radha, V., and N. Hemanth Kumar. "EISA – An Enterprise Application Security Solution for Databases." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abdul Based, Md. "Information Handling in Security Solution Decisions." In Innovations and Advances in Computer Sciences and Engineering. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security solution"

1

Qatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chiș, Alexandru, Titus-Constantin Bălan, Petru-Adrian Cotfas, and Daniel-Tudor Cotfas. "Deployment of a security solution for cloud." In 2024 15th International Conference on Communications (COMM). IEEE, 2024. http://dx.doi.org/10.1109/comm62355.2024.10741412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of a
APA, Harvard, Vancouver, ISO, and other styles
4

Yassine, Hicham, and Mohammad Malli. "A Lightweight IoT Security Solution." In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2019. http://dx.doi.org/10.1109/iwcmc.2019.8766687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, W., and E. K. Park. "e-Healthcare Security Solution Framework." In 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. IEEE, 2012. http://dx.doi.org/10.1109/icccn.2012.6289239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jaigirdar, Fariha Tasmin. "Trust based Security Solution for Internet of Things Healthcare Solution." In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2018. http://dx.doi.org/10.1145/3267305.3277810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Yuanyuan, and He Yang. "Security Solution Based on WSO2 IS." In 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press, 2015. http://dx.doi.org/10.2991/ameii-15.2015.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Werapun, W., A. Abou El Kalam, B. Paillassa, and J. Fasson. "Solution analysis for SIP security threats." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Kai-xing, and Han Xi. "Research on AJAX Security and Solution." In Proceedings of the International Conference. World Scientific Publishing Company, 2008. http://dx.doi.org/10.1142/9789812799524_0320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Newaz, Nishat Tasnim, Mohammad Rafiqul Haque, Tajim Md Niamat Ullah Akhund, Tania Khatun, Milon Biswas, and Mohammad Abu Yousuf. "IoT Security Perspectives and Probable Solution." In 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). IEEE, 2021. http://dx.doi.org/10.1109/worlds451998.2021.9513997.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security solution"

1

Mattila, Petri. Finland's Security Solution in the Future. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Viren. An Aspect-Oriented Security Assurance Solution. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada419305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pruet, Andres. The National Security Data Solution (NSDS). Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1878003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mylrea, Michael, Sri Nikhil Gourisetti, Judah Plummer, et al. Keyless Infrastructure Security Solution (Kiss): Examining Security and Trust Gaps. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1827741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mylrea, Michael, Sri Nikhil Gourisetti, and Heather Culley. Keyless Infrastructure Security Solution (KISS) Technology Landscape Analysis Report. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1826603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perkins, C., and M. Westerlund. Securing the RTP Framework: Why RTP Does Not Mandate a Single Media Security Solution. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mylrea, Michael, Sri Nikhil Gourisetti, Vinod Tatireddy, et al. Keyless Infrastructure Security Solution (KISS): VOLTRON KSI Blockchain Design and Specification. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1828066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Šulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.

Full text
Abstract:
Electronic Voting Systems (EVS) has become more popular and has progressed despite many concerns about auditing and transparency. Authors present a technical solution for a prototype of a possible EVS. This prototype, with additional improvements, could be used as an EVS in Lithuania and other countries worldwide. This article is intended to show how EVS requirements relate to software solutions using open-source products.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!