نتایج جستجو برای: duties of children

تعداد نتایج: 21237559  

Journal: :journal of advances in medical education and professionalism 0
vahid keshtkar community medicine department, shiraz university of medical sciences, shiraz-iran nahid hatam school of management and information sciences, shiraz university of medical sciences, shiraz-iran ehsanolah niikaein school of management and information sciences, shiraz university of medical sciences, shiraz-iran

introduction: hospital managers, as one of the most important health care workers, are the subject of continuous education. in some countries around the world, health management education is an important part of health reforms. the aim of present research is to perform evidence-based studies based on assessing hospital managers’ needs. therefore, it should be considered that educational need as...

Journal: :Trans. Emerging Telecommunications Technologies 2015
Cristina Rottondi Giulia Mauri Giacomo Verticale

A tradeoff between data collection needs and user privacy is of paramount importance in the Smart Grid. This paper proposes a pseudonymization protocol for data gathered by the Smart Meters, which relies on a network infrastructure and a dedicated set of nodes, called Privacy Preserving Nodes (PPNs). The network privacy is enforced by a separation of duties: the PPNs perform data pseudonymizati...

2004
Aung Htike Phyo

Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethical rights to do so. Current Intrusion Detection Systems are ineffective in this context, because they do not have knowledge of user responsibilities, the normal working scope for a particular position, or the separation...

2011
Francesco Corman Ingo A. Hansen

Railway traffic is operated according to a detailed (off-line) schedule of operations, specifying for each train its path through the network plus arrival and departure times at its scheduled stops. During daily operations disturbances perturb the plan and dispatchers take actions in order to keep operations feasible and to limit delay propagation. This paper presents a dispatching tool to hand...

Journal: :Journal of Computer Security 2000
Vijayalakshmi Atluri Wei-kuang Huang

Workflow Management Systems (WFMS) are being widely used today by organizations to coordinate the execution of various applications representing their day-to-day tasks. To ensure that these tasks are executed by authorized users or processes (subjects), and to make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revo...

2005
Brian Milne

What is actually intended by the term ‘participation’ as it is described by the UNCRC? Since it excludes economic and political rights, it goes only a single step toward integrating children into civil society as bearers of full rights who share the duties and responsibilities that are often considered central to citizenship. This essay briefly examines a range of ideas that include philosophic...

Journal: :IRB 2011
Stephen John Cico Eva Vogeley William J Doyle

No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading informed consent language and parents willingness to enroll their children in research report is also a way as one of the collec...

2007
Xiaoli Ren Lu Liu Chenggong Lv

The universal adoption of the Internet requires a fine grained access control in the sharing of sensitive resources. However, existing access control mechanisms are inflexible and do not help in alleviating the management task of administrating users’ access to resources based on security policies. In this paper, we propose an approach to implement fine-grained access control based on RBAC whil...

1995
Tomohiro Nakatani Hiroshi G. Okuno Takeshi Kawabata

The Residue-Driven Architecture presented here is a model of auditory stream segregation from input sounds. A subsystem to extract auditory streams by using some sound attributes is called an agency and the design of each agency is based on the residue-driven architecture. This architecture consists of three kinds of agents: an event-detector, a tracergenerator, and tracers. The event-detector ...

1988
Ravi Sandhu

We describe a model and notation for specifying and enforcing aspects of integrity policies, particularly separation of duties. The key idea is to associate a transaction control expression with each information object. This expression constrains the transactions which can be applied to that object to occur in the speci ed pattern. As operations are actually executed the transaction control exp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید