نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2007
NOAM SHER

This Article seeks to explore previously unexamined differences between the negligence and strict liability rules and thereby examine whether medical liability reform is required. The main thesis is that negligence as a basis for liability entails a unique mechanism, which is essentially different than the strict liability mechanism, and is more efficient for several reasons related to the lega...

2009
Aung Soe

When intermittent mandatory ventilation (IMV) and/or high frequency oscillatory ventilation (HFOV) fails to improve respiratory failure, the imposition of HFOV during IMV has been shown to facilitate alveolar recruitment and improve oxygenation. This mode of ventilation has been referred to as combined oscillatory and mandatory ventilation (COMV) or high frequency oscillation-intermittent venti...

Journal: :Management Science 2017
Susan Feng Lu Lauren Xiaoyuan Lu

Speaker: Dr. Susan Feng Lu Assistant Professor of Management Krannert School of Management Purdue University Abstract: During the 2000s, over a dozen U.S. states passed laws that prohibit healthcare employers from mandating overtime for nurses. Using a nationwide panel data set from 2004 to 2012, we find that these mandatory overtime laws reduced the service quality of nursing homes, as measure...

2007
Matt Henricksen William J. Caelli Peter R. Croll

The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The paper disccuses the importance of a trusted computing base in providing application security. It describes a secure three-tiered architecture, inco...

2012
Jordan M. Barry John William Hatfield

Recent work (Hu and Black (2005, 2007, 2008); Dekel and Wolinsky (2012)) has detailed the twin issues of empty voting and hidden/morphable ownership. The former arises when an actor has control rights over a corporation but no economic interest in that corporation, such as when an investor borrows shares. The latter arises when a shareholder has an economic or voting interest in a corporation b...

2016
Stanley Schade Martin Strehler

In several applications of network flows, additional constraints have to be considered. In this paper, we study flows, where the flow particles have an orientation. For example, cargo containers with doors only on one side and train coaches with 1st and 2nd class compartments have such an orientation. If the end position has a mandatory orientation, not every path from source to sink is feasibl...

Journal: :The Yale Journal of Biology and Medicine 1987
Laurence A. Greenbaum

The next section of the book discusses the physical aspects of ventilator types, control patterns, and the choice of particular modes for clinical situations. Of good use in this section is the discussion of common problems of various ventilator modes. Again the discussion is at a basic level, of use only to those gaining an introduction to the utilization of ventilators. The final section of t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :Journal of Computer Security 2012
Daniel B. Giffin Amit A. Levy Deian Stefan David Terei David Mazières John C. Mitchell Alejandro Russo

Modern extensible web platforms like Facebook and Yammer depend on third-party software to offer a rich experience to their users. Unfortunately, users running a third-party “app” have little control over what it does with their private data. Today’s platforms offer only ad-hoc constraints on app behavior, leaving users an unfortunate trade-off between convenience and privacy. A principled appr...

2009
Abdessamad Imine Michaël Rusinowitch Asma Cherif

Distributed Collaborative Editors (DCE) provide computer support for modifying simultaneously shared documents, such as articles, wiki pages and programming source code, by dispersed users. Controlling access in such systems is still a challenging problem, as they need dynamic access changes and low latency access to shared documents. In this paper, we propose a Mandatory Access Control (MAC) b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید