نتایج جستجو برای: enforcement mechanisms
تعداد نتایج: 555562 فیلتر نتایج به سال:
Security concerned users and organizations must be provided with the means to protect and control access to object-oriented software, especially with an exploding interest in designing/developing object-oriented software in Java, C++, and Ada95. Our user-role based security (URBS) approach has emphasized: a customizable public interface that appears di erently at di erent times for speci c user...
Some or all of the promotional activities of pharmaceutical companies are typically governed through self-regulatory codes administered by industry associations. However, the conflicts between the commercial objectives and the ethical and scientific goals of promotion can potentially lead to serious weaknesses in the way in which these codes are enforced. This paper focuses on 5 critical aspect...
This work addresses Grid fairshare allocation policy enforcement and presents Aequus, a decentralized system for Grid-wide fairshare job prioritization. The main idea of fairshare scheduling is to prioritize users with regard to predefined resource allocation quotas. The presented system builds on three contributions; a flexible tree-based policy model that allows delegation of policy definitio...
The design principle of maximizing local autonomy except when it conflicts with global robustness has led to a scalable Internet with enormous heterogeneity of both applications and infrastructure. These properties have not been achieved in the mechanisms for specifying and enforcing security policies. The STRONGMAN (for Scalable TRust Of Next Generation MANagement) system [14], [15] offers thr...
Summary The Member States have sufficient leeway to maintain or flexibly shape the domestic map of consumer enforcement system within European Union, thus reflecting sociocultural conditions State concerned. In this study I focus on redress mechanisms in wider and narrow sense Hungarian legal system, highlighting unique special solutions.
Tanzania, arguably mainland Africa's most important nation for conservation, is losing habitat and natural resources rapidly. Moving away from a charcoal energy base and developing sustainable finance mechanisms for natural forests are critical to slowing persistent deforestation. Addressing governance and capacity deficits, including law enforcement, technical skills, and funding, across parts...
This Article examines treaty body compliance discourse through an examination of the CEDAW Committee’s jurisprudence related to sub-Saharan Africa. Drawing on the constructivist literature and the sociological framing literature, Part I of this article introduces adoption and adaptation as key features for domestically enforcing treaty obligations. Part I also introduces the CEDAW Committee com...
Information security is strongly dependent on access control models and cryptographic techniques. These are well established areas of research and practice in the enforcement of technical information security policies but are not capable of supporting development of comprehensive information security within organizations. Therefore, there is a need to study upper level issues to establish organ...
Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential f...
In the landmark paper on the theoretical side of Polymer, Ligatti and his co-authors have identified a new class of enforcement mechanisms based on the notion of edit automata, that can transform sequences and enforce more than simple safety properties. We show that there is a gap between the edit automata that one can possibly write (e.g. by Ligatti himself in his running example) and the edit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید