نتایج جستجو برای: privilege
تعداد نتایج: 6645 فیلتر نتایج به سال:
We suggest that one source of understanding entrepreneurial resilience and regional culture is through the denizens Silicon Valley, how they are handling crisis situations. surveyed 119 entrepreneurs, investors, large company executives based in Valley during first COVID-19 lockdown period between April May 2020. Our data show entrepreneurs perceived situation as severe but were cautiously opti...
The Lincoln Laboratory Malicious Code Detector (LIMACODE) is a system for statically detecting privilege-escalating exploits in data streams, such as files and network traffic. LIMACODE operates as follows: it scans data streams, identifies the language of the stream, then extracts language-specific features for input to a feed-forward neural network classifier which labels the stream as either...
Allografts are afforded a level of protection from rejection within immune-privileged tissues. Immune-privileged tissues involve mechanisms that suppress inflammation and promote immune tolerance. There are anatomical features, soluble factors, membrane-associated proteins, and alternative antigen-presenting cells (APC) that contribute to allograft survival in the immune-privileged tissue. This...
چکیده ندارد.
Many grid usage scenarios depend on small, dynamic working groups for which the ability to establish transient collaboration with little or no intervention from resource administrators is a key requirement. The system developed, PRIMA, focuses on the issues of management and enforcement of fine-grained privileges. Dynamic account creation and leasing as well as expressive enforcement mechanisms...
Most mobile agent systems use internal data structures within an agent to control and specify its security requirements and properties. These structures typically contain authorization information regarding access to computational resources on distributed systems and conceptually serve as an internal passport for the agent. While these structures are often very similar semantically, they differ...
Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented mandatory access control and sandboxing. This allows developers and users to restrict the execution of an application to the privileges it has (mandatorily) assigned at installation time. The exploitation of vulnerabilities in pro...
We have previously presented a framework for updating privileges and creating management structures by means of authority certificates. These are used both to create access-level permissions and to delegate authority to other agents. In this paper we extend the framework to support a richer set of revocation schemes. As in the original, we present an associated calculus of privileges, encoded a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید