نتایج جستجو برای: enforcement mechanisms

تعداد نتایج: 555562  

1997
Steven A. Demurjian T. C. Ting John A. Reisner

Security concerned users and organizations must be provided with the means to protect and control access to object-oriented software, especially with an exploding interest in designing/developing object-oriented software in Java, C++, and Ada95. Our user-role based security (URBS) approach has emphasized: a customizable public interface that appears di erently at di erent times for speci c user...

Journal: :CMAJ : Canadian Medical Association journal = journal de l'Association medicale canadienne 1997
J Lexchin

Some or all of the promotional activities of pharmaceutical companies are typically governed through self-regulatory codes administered by industry associations. However, the conflicts between the commercial objectives and the ethical and scientific goals of promotion can potentially lead to serious weaknesses in the way in which these codes are enforced. This paper focuses on 5 critical aspect...

Journal: :Future Generation Comp. Syst. 2013
Per-Olov Östberg Daniel Espling Erik Elmroth

This work addresses Grid fairshare allocation policy enforcement and presents Aequus, a decentralized system for Grid-wide fairshare job prioritization. The main idea of fairshare scheduling is to prioritize users with regard to predefined resource allocation quotas. The presented system builds on three contributions; a flexible tree-based policy model that allows delegation of policy definitio...

2003
Angelos Keromytis Kostas Anagnostakis Sotiris Ioannidis Michael Greenwald Jonathan Smith Michael B. Greenwald

The design principle of maximizing local autonomy except when it conflicts with global robustness has led to a scalable Internet with enormous heterogeneity of both applications and infrastructure. These properties have not been achieved in the mechanisms for specifying and enforcing security policies. The STRONGMAN (for Scalable TRust Of Next Generation MANagement) system [14], [15] offers thr...

Journal: :Mezinárodní a srovnávací právní revue 2022

Summary The Member States have sufficient leeway to maintain or flexibly shape the domestic map of consumer enforcement system within European Union, thus reflecting sociocultural conditions State concerned. In this study I focus on redress mechanisms in wider and narrow sense Hungarian legal system, highlighting unique special solutions.

Journal: :Conservation biology : the journal of the Society for Conservation Biology 2016
Tim Caro Tim R B Davenport

Tanzania, arguably mainland Africa's most important nation for conservation, is losing habitat and natural resources rapidly. Moving away from a charcoal energy base and developing sustainable finance mechanisms for natural forests are critical to slowing persistent deforestation. Addressing governance and capacity deficits, including law enforcement, technical skills, and funding, across parts...

2013
Angela M. Banks

This Article examines treaty body compliance discourse through an examination of the CEDAW Committee’s jurisprudence related to sub-Saharan Africa. Drawing on the constructivist literature and the sociological framing literature, Part I of this article introduces adoption and adaptation as key features for domestically enforcing treaty obligations. Part I also introduces the CEDAW Committee com...

1997
Yuliang Zheng

Information security is strongly dependent on access control models and cryptographic techniques. These are well established areas of research and practice in the enforcement of technical information security policies but are not capable of supporting development of comprehensive information security within organizations. Therefore, there is a need to study upper level issues to establish organ...

2002
Valentin Razmov

Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential f...

2008
Nataliia Bielova Fabio Massacci

In the landmark paper on the theoretical side of Polymer, Ligatti and his co-authors have identified a new class of enforcement mechanisms based on the notion of edit automata, that can transform sequences and enforce more than simple safety properties. We show that there is a gap between the edit automata that one can possibly write (e.g. by Ligatti himself in his running example) and the edit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید