نتایج جستجو برای: implementation of access control

تعداد نتایج: 21307868  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم کشاورزی و منابع طبیعی گرگان - دانشکده کشاورزی 1391

چکیده مورچه‏ها با حمایت از شپشک‏ها در مقابل دشمنان طبیعی، می‏توانند برنامه‏های کنترل بیولوژیک آن‏ها را مختل ‏نمایند. طی سال‏های 1389 و 1390 با نمونه‏برداری از باغات مرکبات شهرستان‏های ساری و بهشهر، فون و فراوانی نسبی مورچه‏هایِ همراه با شپشک‏ها مورد مطالعه قرار گرفت. همچنین، تاثیر تراکم‏های مختلف کاست کارگر گونه‏ی santschi lasius turcicus بر میزان تغذیه و فراسنجه‏های واکنش تابعی حشرات ماده و لا...

2014
Timothy L. Hinrichs Diego Martinoia William C. Garrison Adam J. Lee Alessandro Panebianco Lenore Zuck

Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge. Yet today’s techniques for comparing access control schemes completely ignore the setting in which the scheme is to be deployed. In this paper, we present a formal framework for comparing access control schemes with respect to a particular application. The analyst’s ...

Hossein Jafarizadeh, Leyla Alilu, Negin Azizi, Vahid Ali Nejad,

Background & Aim: One of the basic and important needs of hemodialysis patients is vascular access. Nursing students as members of the health team and future nurses, play an essential role in the safety management of hemodialysis patients and therefore, their training is important to support patient safety. Today, evidence-based education with the objective of explicit and rational use of the b...

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - پژوهشکده فنی و مهندسی 1388

asymmetric polyethersulfone (pes) microfiltration flat sheet membranes were composed by the phase inversion method (pim) and were used as supports. composite membranes were fabricated by coating silicone rubber as selective layer. effect of different concentrations of pes and pdms and different solvent such as nmp, dmf and dms effects as pes solvents and support thickness and different coagulat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم تربیتی و روانشناسی 1393

the purpose of this study was to investigate the relationship between teachers’ class management practices with students’ self- regulated learning and academic self-efficacy. in this study relating to the management class, three dimensions, (training management, people management and behavior management) and three style (interventionist, interactionist and non-interventionist) was considered. r...

2011
Vijayalakshmi Atluri David F. Ferraiolo

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی و پایه 1390

the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...

1996
Ravi Sandhu George Mason

2 Abstract Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. In this paper we formally show that lattice-based mandatory access controls can be enforced by appropriate connguration of RBAC c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید