Academic literature on the topic 'Web service security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web service security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web service security"

1

Geuer-Pollmann, Christian, and Joris Claessens. "Web services and web service security standards." Information Security Technical Report 10, no. 1 (2005): 15–24. http://dx.doi.org/10.1016/j.istr.2004.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rouached, Mohsen. "Web Service Composition Security." International Journal of Service Science, Management, Engineering, and Technology 12, no. 3 (2021): 154–74. http://dx.doi.org/10.4018/ijssmet.2021050109.

Full text
Abstract:
The continuous adoption of service-oriented architecture (SOA) and web services across vertical industries, geographies, and organization sizes generates new major security concerns both for individuals and organizations. Many of the features that make web services attractive, including greater accessibility of data, dynamic application-to-application connections, and relative autonomy are at odds with traditional security models and controls. Current web service composition technologies still present serious risks to individual and enterprise security and privacy. In the presence of multiple
APA, Harvard, Vancouver, ISO, and other styles
3

Raepple, Martin. "Web service security netiquette." Datenschutz und Datensicherheit - DuD 31, no. 9 (2007): 648–51. http://dx.doi.org/10.1007/s11623-007-0216-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.

Full text
Abstract:
The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services.
APA, Harvard, Vancouver, ISO, and other styles
5

Aniyikaiye, Jide, and Emmanuel Udoh. "Web Services Gateway." International Journal of Grid and High Performance Computing 8, no. 1 (2016): 85–92. http://dx.doi.org/10.4018/ijghpc.2016010108.

Full text
Abstract:
Cloud computing has many advantages and is being used increasingly as an efficient and safe solution for web based services. This on-demnd self-service provides network access to a shared pooi of redundant computing resources. Software applications are being developed in the cloud and there are demands for the interoperability of these applications. A common way to meet this demand is the development of Web services (applications), taking advantage of Service-oriented architecture principles. These loosely coupled Web base components pose some security challenges. This paper examines Security
APA, Harvard, Vancouver, ISO, and other styles
6

Iacono, Luigi Lo, and Jun Wang. "Web service layer security (WSLS)." Network Security 2008, no. 2 (2008): 10–13. http://dx.doi.org/10.1016/s1353-4858(08)70018-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yue, Hua, and Xu Tao. "Web Services Security Problem in Service-oriented Architecture." Physics Procedia 24 (2012): 1635–41. http://dx.doi.org/10.1016/j.phpro.2012.02.241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hee, Kai-Cheong, and Chiung Ching Ho. "Design of Application Layer Services for Security Automation via a Web Service Approach." Journal of Advances in Computer Networks 2, no. 1 (2014): 76–84. http://dx.doi.org/10.7763/jacn.2014.v2.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Martino, Lorenzo D., and Elisa Bertino. "Security for Web Services." International Journal of Web Services Research 6, no. 4 (2009): 48–74. http://dx.doi.org/10.4018/jwsr.2009071303.

Full text
Abstract:
This article discusses the main security requirements for Web services and it describes how such security requirements are addressed by standards for Web services security recently developed or under development by various standardizations bodies. Standards are reviewed according to a conceptual framework that groups them by the main functionalities they provide. Covered standards include most of the standards encompassed by the original Web Service Security roadmap proposed by Microsoft and IBM in 2002 (Microsoft and IBM 2002). They range from the ones geared toward message and conversation s
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yao Qin. "Research on Security Architecture Based on Web Service System." Applied Mechanics and Materials 687-691 (November 2014): 1716–19. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1716.

Full text
Abstract:
Web service is a distributed Web application model, with platform independence, openness, loose coupling and other features. These features bring convenience to application integration, which also faces many security issues, mainly for computer hardware, applications, buffer overflows, message transmission process and other security threats. XML Web services architecture strengthen the security threats defense through digital signatures, encryption, and a series of measures of WS-Security by the sender, the receiver, the key server and assertion server which consist of SOAP security with chara
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Web service security"

1

Bill, Andreas, and Robert Persson. "A secure web service : Specification on how to implement a secure Web service in a health care environment." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-365.

Full text
Abstract:
<p>Background: With Web service growing popularity more and more companies chose to apply Web service in their organisation. With the rising usage of the concept the demands rise with it. For companies that deal with vulnerable information for example hospitals, there needs to be strong security measures taken.</p><p>Purpose: The aim of the report is to examine different security functions that can help developers to secure Web service applications. The report will be written so that organisations such as health care organisation can get insight on how to use a secure Web services in their lin
APA, Harvard, Vancouver, ISO, and other styles
2

Ngu, Phuc Huy. "Web applications - New mobile service paradigm." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19040.

Full text
Abstract:
The explosion of mobile applications both in number and variety raises the need of shedding light on their architecture, composition and quality. Indeed, it is crucial to understand which mobile application paradigm fits better to what type of application and usage. Such understanding has direct consequences on the user experience, the development cost and sale revenues of mobile apps. In this thesis, we identify four main mobile application paradigms and evaluate them from the viewpoints of developers, users and service providers. To ensure objectivity and accuracy we start by defining high l
APA, Harvard, Vancouver, ISO, and other styles
3

Chatterjee, Ash. "Leveraging service oriented architecture to enhance information sharing for surface transportation security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FChatterjee.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2008.<br>Thesis Advisor(s): Bergin, Richard. "September 2008." Description based on title screen as viewed on November 4, 2008. Includes bibliographical references (p. 85-87). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Moyo, Thamsanqa. "An investigation into interoperable end-to-end mobile web service security." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1137/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Erickson, Adam, and Oscar Nielsen. "Keep our web applications safe : A security evaluation of Service Workers." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161753.

Full text
Abstract:
With the ever-expanding internet, finding new ways to increase the user experience are vital in order to keeping concurrent users on your web application. One way to achieve this could be to implement a Service Worker to unlock more capabilities of a web application. The purpose of this paper is to evaluate what new security vulnerabilities can arise when implementing a Service Worker. This could then be used to evaluate if the technology has evolved far enough to be used by a wider audience of programmers and users. The analysis in this paper will be presented in a security matrix that is bas
APA, Harvard, Vancouver, ISO, and other styles
6

Ophoff, Jacobus Albertus. "WSP3: a web service model for personal privacy protection." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/272.

Full text
Abstract:
The prevalent use of the Internet not only brings with it numerous advantages, but also some drawbacks. The biggest of these problems is the threat to the individual’s personal privacy. This privacy issue is playing a growing role with respect to technological advancements. While new service-based technologies are considerably increasing the scope of information flow, the cost is a loss of control over personal information and therefore privacy. Existing privacy protection measures might fail to provide effective privacy protection in these new environments. This dissertation focuses on the us
APA, Harvard, Vancouver, ISO, and other styles
7

Singaravelu, Lenin. "End-to-End Security of Information Flow in Web-based Applications." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16142.

Full text
Abstract:
Web-based applications and services are increasingly being used in security-sensitive tasks. Current security protocols rely on two crucial assumptions to protect the confidentiality and integrity of information: First, they assume that end-point software used to handle security-sensitive information is free from vulnerabilities. Secondly, these protocols assume point-to-point communication between a client and a service provider. However, these assumptions do not hold true with large and complex vulnerable end point software such as the Internet browser or web services middleware or in web s
APA, Harvard, Vancouver, ISO, and other styles
8

Kondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.

Full text
Abstract:
This thesis presents the development of a Web Service for the Hotline module of the Knowledge Management Information Tool (KMIT), a tool that is custom built for the decontamination & decommissionin (D&D) community of the Department Of Energy (DOE). The Hotline module allows interested users to post problems to specific areas of interest in the field of D&D. Various clients working with DOE and KMIT want to display the latest published problems of KMIT Hotline search in their own applications on a regular basis. Considering one of the major benefits of Web Services is the ease of integration o
APA, Harvard, Vancouver, ISO, and other styles
9

Metin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.

Full text
Abstract:
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining &quot<br>enterprise-level&quot<br>and &quot<br>application-level&quot<br>security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security.
APA, Harvard, Vancouver, ISO, and other styles
10

Skogsrud, Halvard Computer Science &amp Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.

Full text
Abstract:
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular technology to connect applications both within and across enterprise boundaries. However, as services are increasingly used to implement critical functionality, security has become an important concern impeding the widespread adoption of SOA. Trust negotiation is an approach to access control that may be applied in scenarios where service requesters are often unknown in advance, such as for services available via the public Internet. Rather than relying on requesters' identities, trust negotiat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Web service security"

1

Bertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-87742-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Springer-Verlag Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1977-, Gutierrez Carlos, Fernandez-Medina Eduardo 1973-, and Piattini Mario 1966-, eds. Web services security development and architecture: Theoretical and practical issues. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wiehler, Gerhard. Mobility, Security und Web Services: Neue Technologien und Service-orientierte Architekturen für zukunftsweisende IT-Lösungen. Publicis Corporate Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Axel, Bücker, and International Business Machines Corporation. International Technical Support Organization., eds. Understanding SOA security: Design and implementation. IBM, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Liang-Jie. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cyberwars: Espionage on the Internet. Plenum Trade, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guisnel, Jean. Cyberwars: Espionage on the Internet. Perseus Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liang-Jie, Zhang, ed. Web services research for emerging applications: Discoveries and trends. Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Web service security"

1

Damiani, Ernesto. "Web Service Security." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Standards for Web Services Security." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baer, Daniel, Andreas Philipp, and Norbert Pohlmann. "Web Service Security — XKMS (TrustPoint)." In ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84984-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Access Control for Web Services." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Web Services Threats, Vulnerabilities, and Countermeasures." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Web Service Technologies, Principles, Architectures, and Standards." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hasan, Jeffrey. "Secure Web Services with WS-Security." In Expert Service-Oriented Architecture in C#. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0747-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nakamura, Yuichi, Fumiko Sato, and Hyen-Vui Chung. "Syntactic Validation of Web Services Security Policies." In Service-Oriented Computing – ICSOC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74974-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ghourabi, Abdallah, Tarek Abbes, and Adel Bouhoula. "Behavior Analysis of Web Service Attacks." In ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Introduction." In Security for Web Services and Service-Oriented Architectures. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web service security"

1

Carminati, Barbara, Elena Ferrari, and Patrick K. Hung. "Security Conscious Web Service Composition." In 2006 IEEE International Conference on Web Services (ICWS'06). IEEE, 2006. http://dx.doi.org/10.1109/icws.2006.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Jian, and Zhimin Huang. "Proxy-Based Web Service Security." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Xinfeng, and Lei Zhong. "Improving Web Service Security and Privacy." In 2011 IEEE World Congress on Services (SERVICES). IEEE, 2011. http://dx.doi.org/10.1109/services.2011.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garcia, Diego Zuquim Guimarães, and Maria Beatriz Felgar de Toledo. "Web service security management using semantic web techniques." In the 2008 ACM symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1363686.1364225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Agreindra Helmiawan, Muhamad, Esa Firmansyah, Irfan Fadil, Yanvan Sofivan, Fathoni Mahardika, and Agun Guntara. "Analysis of Web Security Using Open Web Application Security Project 10." In 2020 8th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2020. http://dx.doi.org/10.1109/citsm50537.2020.9268856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pencheva, Evelina, and Ivaylo Atanasov. "Web Services for Quality of Service Monitoring." In 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2009. http://dx.doi.org/10.1109/ntms.2009.5384834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yamany, Hany F. EL, Miriam A. M. Capretz, and David S. Allison. "Quality of Security Service for Web Services within SOA." In 2009 IEEE Congress on Services (SERVICES). IEEE, 2009. http://dx.doi.org/10.1109/services-i.2009.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Imamura, Takeshi, Michiaki Tatsubori, Yuichi Nakamura, and Christopher Giblin. "Web services security configuration in a service-oriented architecture." In Special interest tracks and posters of the 14th international conference. ACM Press, 2005. http://dx.doi.org/10.1145/1062745.1062898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Narula, Saakshi, Arushi Jain, and Prachi. "Cloud Computing Security: Amazon Web Service." In 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE, 2015. http://dx.doi.org/10.1109/acct.2015.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Movahednejad, Homa, Suhaimi Bin Ibrahim, Mahdi Sharifi, Harihodin Bin Selamat, and Sayed Gholam Hassan Tabatabaei. "Security-aware web service composition approaches." In the 13th International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2095536.2095557.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Web service security"

1

Rao, Jinghai, and Norman Sadeh. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada456148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aldrich, Susan. Web Services Security Issues and Antidotes. Patricia Seybold Group, 2003. http://dx.doi.org/10.1571/ii2-27-03cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Novakouski, Maro, Soumya Simanta, Gunnar Peterson, Ed Morris, and Grace Lewis. Performance Analysis of WS-Security Mechanisms in SOAP-Based Web Services. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada536681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wrage, Lutz, Soumya Simanta, Grace A. Lewis, and Saul Jaspan. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada479241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bassi, Marina. What Do You Think of the IDB?: Conclusions from an Opinion Survey of Latin American Leaders about Multilateral Organizations. Inter-American Development Bank, 2007. http://dx.doi.org/10.18235/0010879.

Full text
Abstract:
This document analyzes the results of a Web-based survey conducted by the Research Department to assess how the IDB is viewed by political and corporate leaders in the region. The questionnaire included 31 questions that compared the IDB to the IMF, World Bank, CAF, BCIE and CDB. The sample includes the responses of 336 representatives from the 26 Latin American and Caribbean IDB member countries. In general, the IDB has a better image than the other multilateral organizations in understanding development problems and contributing to their solutions. Its main comparative advantage is in the de
APA, Harvard, Vancouver, ISO, and other styles
6

Chaimite, Egidio, Salvador Forquilha, and Alex Shankland. Who Can We Count On? Authority, Empowerment and Accountability in Mozambique. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.019.

Full text
Abstract:
In this paper, we explore the use of a governance diaries methodology to investigate poor households’ interactions with authority in fragile, conflict and violence-affected settings in Mozambique. The research questioned the meanings of empowerment and accountability from the point of view of poor and marginalised people, with the aim of understanding what both mean for them, and how that changes over time, based on their experiences with governance. The study also sought to record how poor and marginalised households view the multiple institutions that govern their lives; providing basic publ
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.

Full text
Abstract:
West African women are frequently absent from discussions of community security, despite their substantial contributions to local defense. Women are often viewed primarily as beneficiaries of attempts to reduce local violence, such that their roles in community-based security are typically overlooked. Yet women’s participation in CBAGs holds important implications for the national security of conflict-affected states. Understanding women’s participation in community-based armed groups matters for successful demobilization, disarmament, and reintegration programs and for states’ implementation
APA, Harvard, Vancouver, ISO, and other styles
8

Scholl, Lynn, Daniel Oviedo, and Orlando Sabogal-Cardona. Disrupting Personal (In)Security? The Role of Ride-Hailing Service Features, Commute Strategies, and Gender in Mexico City. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003812.

Full text
Abstract:
This paper sheds light on the personal security dimension of ride-hailing from a gender perspective. We explore how features of Transportation Network Companies (TNCs) services affect riders perceptions of security when commuting in ride-hailing services, and how general perceptions of fear of crime shape the way people value such features. Moreover, we analyze the strategies women and men are using to enhance their own security in ride-hailing and factors influencing these strategies. We conducted a survey of users of the TNC DiDi in Mexico City. The statistical methods used are structural eq
APA, Harvard, Vancouver, ISO, and other styles
9

Nickle, John. The Role of Health Services Support in the Theater Security Cooperation Plan: Do We Have It Right. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada426005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Azuara Herrera, Oliver, Mariano Bosch, and Eric Torres Ramirez. Employment and Living Conditions of the Population over 50 in Latin America. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005146.

Full text
Abstract:
This document describes recent demographic, economic, and social trends of people 50 and older in Latin America. We analyze the labor profile of those generations who will face retirement over the next two decades to understand how likely it is to reduce the current gaps in coverage and sustainability of pensions. We explore the occupation profiles, contributions to social security, and their comparisons with previous generations. The document's last section describes different inequality angles for this population, including income and access to public services.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!