نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2006
Adashima Muhammad

The topic of mandatory HIV notification is controversial and conflicting for counselors and public health workers. Counselors may seek to maintain patient confidentiality and public health workers are concerned with combating the spread of sexually transmitted infections. Embedded between bioethical priorities and public health concern is the HIV positive patient. Thus, there exists a convolute...

2007
Yingyuan Xiao Yunsheng Liu Guoqiong Liao

A class of security-critical applications with the requirements of timing constraints, such as wireless stock trading, power network scheduling, real-time traffic information management, etc., demand the support of mobile distributed real-time database systems. For the class of applications, mobile distributed realtime database systems must simultaneously satisfy two requirements in guaranteein...

2002
Kyoung-Don Kang Sang Hyuk Son John A. Stankovic

Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data items can be classified into several security levels according to their clearance and sensitivity levels. It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., secre...

2015
Peter Amthor

To meet tightening security requirements, modern operating systems enforce mandatory access control based on formal security policies. To ensure the critical property of policy correctness, formal methods and models for both their specification and verification are used. The variety of these approaches reflects the diversity and heterogeneity of policy semantics, which makes policy engineering ...

Journal: :CoRR 2017
Peter Amthor

Security-critical system requirements are increasingly enforced through mandatory access control systems. These systems are controlled by security policies, highly sensitive system components, which emphasizes the paramount importance of formally verified security properties regarding policy correctness. For the class of safety-properties, addressing potential dynamic right proliferation, a num...

2013
Aline Bousquet Jérémy Briffaut Laurent Clevy Christian Toinard Benjamin Venelle

With the growing use of smartphones and other mobile devices, it becomes essential to be able to assure the user that his system and applications are doing exactly what they are supposed to do. Over the years and despite its configuration complexity, Mandatory Access Control has proven its efficiency in protecting systems. This paper proposes a solution providing a generic protection that doesn...

2009
Michael Decker

Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user’s identity whereas the basic idea ...

2003
Oliver Board

There are many laws which require sellers to disclose private information about the quality of their products. But the theoretical justification for these laws is not obvious: economic theory predicts that a seller will voluntarily disclose such quality information, however unfavorable, as long as it is costless to do so. Here we show that competitive pressures between firms may undermine this ...

Journal: :Games and Economic Behavior 2012
Silvana Krasteva Huseyin Yildirim

The preference between public and private negotiations for a buyer who sequentially visits two suppliers is examined. It is shown that the buyer weakly prefers to conduct private negotiations in order to create strategic uncertainty about the trade history. With substitute goods, such uncertainty is valuable only when price offers have short expiries that prevent a head-to-head supplier competi...

2017
Sydney Malama Musso Munyeme Adrian Muwonge John Muma

Title: Characterization of Non-Tuberculous Mycobacterium from Humans and Water in an Agro pastoral area in Zambia Authors: Sydney Malama ([email protected]) Ngula Monde ([email protected]) Musso Munyeme ([email protected]) Adrian Muwonge ([email protected]) John Muma ([email protected]) Version: 1 Date: 09 Oct 2017 Author’s response to reviews: Dear Editor Thanks...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید