نتایج جستجو برای: implementation of access control
تعداد نتایج: 21307868 فیلتر نتایج به سال:
چکیده مورچهها با حمایت از شپشکها در مقابل دشمنان طبیعی، میتوانند برنامههای کنترل بیولوژیک آنها را مختل نمایند. طی سالهای 1389 و 1390 با نمونهبرداری از باغات مرکبات شهرستانهای ساری و بهشهر، فون و فراوانی نسبی مورچههایِ همراه با شپشکها مورد مطالعه قرار گرفت. همچنین، تاثیر تراکمهای مختلف کاست کارگر گونهی santschi lasius turcicus بر میزان تغذیه و فراسنجههای واکنش تابعی حشرات ماده و لا...
Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge. Yet today’s techniques for comparing access control schemes completely ignore the setting in which the scheme is to be deployed. In this paper, we present a formal framework for comparing access control schemes with respect to a particular application. The analyst’s ...
Background & Aim: One of the basic and important needs of hemodialysis patients is vascular access. Nursing students as members of the health team and future nurses, play an essential role in the safety management of hemodialysis patients and therefore, their training is important to support patient safety. Today, evidence-based education with the objective of explicit and rational use of the b...
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
asymmetric polyethersulfone (pes) microfiltration flat sheet membranes were composed by the phase inversion method (pim) and were used as supports. composite membranes were fabricated by coating silicone rubber as selective layer. effect of different concentrations of pes and pdms and different solvent such as nmp, dmf and dms effects as pes solvents and support thickness and different coagulat...
the purpose of this study was to investigate the relationship between teachers’ class management practices with students’ self- regulated learning and academic self-efficacy. in this study relating to the management class, three dimensions, (training management, people management and behavior management) and three style (interventionist, interactionist and non-interventionist) was considered. r...
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...
2 Abstract Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. In this paper we formally show that lattice-based mandatory access controls can be enforced by appropriate connguration of RBAC c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید