Search results
Create the page "Security" on this wiki! See also the search results found.
- ...ted. Furthermore, they offered, efficiency, accuracy, reproducibility, and security. ...ted. Furthermore, they offered, efficiency, accuracy, reproducibility, and security.29 KB (4,584 words) - 21:34, 29 October 2016
- ...epaired, confronted by two seemingly identical yachts. North turned to the security man, who was being held at gunpoint by one of his cronies.‘If you want to4 KB (656 words) - 23:43, 3 October 2016
- ...ly self-executing, self-enforcing, or both. Smart contracts aim to provide security superior to traditional contract law and to reduce other transaction costs ...art contract is visible to all users of said blockchain and this can cause security issues.5 KB (741 words) - 21:33, 30 January 2019
- [[Category:Security]]1 KB (150 words) - 15:41, 12 September 2018
- ...merchant was not tempted to cheat on the lender (an early ancestor of the security trustee perhaps!). borrowing in an enforcement of any security interest given by the borrower over the assets comprised in the236 KB (39,146 words) - 23:37, 30 January 2019
- * Loan and security documents ...m the perspective of the lenders, rather than take an assignment by way of security of such a commitment owed by the sponsors/shareholders to the project compa44 KB (7,134 words) - 11:01, 15 May 2020
- [[Category:Security]]439 bytes (52 words) - 20:04, 4 October 2018
- ...ct and activities ancillary thereto as permitted by this Agreement and the Security Documents or ...y Interest over all or any of its present or future assets, other than any Security Interest arising by operation of law and discharged within 30 days or28 KB (4,675 words) - 11:00, 15 May 2020
- Food security;9 KB (1,214 words) - 21:44, 16 November 2022
- ...arguments for Blockchain adoption are that its data architecture provides security, anonymity, provenance, immutability and purpose of data without any third-10 KB (1,413 words) - 11:40, 15 May 2020
- ...ible future courses of action to improve the increasingly vulnerable cyber-security environment of the built environment across all life cycle phases - design,2 KB (329 words) - 12:26, 15 May 2020
- Blockchain has characteristics in its architecture that provide security, anonymity, provenance, immutability and purpose of data without any third-5 KB (701 words) - 12:39, 15 May 2020
- [[Cyber security]], [[digital twin]], [[AECO]], [[BIM]], [[CDE]], [[cyber vulnerability]].2 KB (257 words) - 09:22, 10 March 2022
- ...chain and decentralized identities can help to re-establish trust, improve security and develop new business models. Not all blockchains are equal and to guara [[IoT]], [[blockchain]], [[sustainability]], [[connectivity]], [[security]], [[IOTA]].1 KB (189 words) - 17:25, 23 February 2022
- ...doption of Building Information Modelling (BIM) raises concerns about data security, data ownership, legal implications and responsibility distribution in shar ...eing investigated. Decentralised blockchain-enabled CDE could provide data security, quality, and integrity standards, which are vital for its function. It cou30 KB (4,201 words) - 12:09, 3 July 2022
- ...tems of united BCDTs where trust, collaboration, data sharing, information security, efficiency, and sustainability are improved throughout the lifecycle of s3 KB (476 words) - 16:02, 21 March 2023
- ...and pre-certifying. These records are intended to improve the safety and security infrastructure of data systems for generations to come.2 KB (230 words) - 16:54, 21 March 2023
- ...d manner using encryption protocols such as AES which undoubtedly provides security but adversely affects the functional properties of BIM models. Therefore, b3 KB (353 words) - 18:56, 16 May 2023
- In facility management, blockchain is harnessed to bolster the security of occupancy data and maintenance records. Sensor-derived occupancy data is Throughout the discourse, Prof. Cheng underscores the pivotal role of data security within the digitized construction realm, spotlighting blockchain's potentia52 KB (7,101 words) - 19:17, 27 November 2023
- ...For example, Hung et al (2020) discussed using blockchain to enhance data security, integrity, and trust in digital twin systems. They emphasized blockchain's ...ckchain architecture integrating even-sourcing technology for digital twin security. Event Sourcing, a design approach that maintains state as a sequence of op5 KB (724 words) - 10:06, 18 March 2024