نتایج جستجو برای: operating policy

تعداد نتایج: 412364  

Journal: :Infection control and hospital epidemiology 2014
Gonzalo Bearman Kristina Bryant Surbhi Leekha Jeanmarie Mayer L Silvia Munoz-Price Rekha Murthy Tara Palmore Mark E Rupp Joshua White

Healthcare personnel (HCP) attire is an aspect of the medical profession steeped in culture and tradition. The role of attire in cross-transmission remains poorly established, and until more definitive information exists priority should be placed on evidence-based measures to prevent healthcare-associated infections (HAIs). This article aims to provide general guidance to the medical community ...

1998
John Hale Jody Threet Sujeet Shenoi

Access control is the cornerstone of information security and integrity, but the semantic diversity of object models makes it diicult to provide a common foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies for object-oriented systems. The architecture described i...

Journal: :Future Generation Comp. Syst. 2013
Per-Olov Östberg Daniel Espling Erik Elmroth

This work addresses Grid fairshare allocation policy enforcement and presents Aequus, a decentralized system for Grid-wide fairshare job prioritization. The main idea of fairshare scheduling is to prioritize users with regard to predefined resource allocation quotas. The presented system builds on three contributions; a flexible tree-based policy model that allows delegation of policy definitio...

2000
ROBERT E. HALL

Microsoft stands accused of an illegal defense of its dominant position in the desktop operatingsystem market. According to the charge, exclusionary contracts and predatory conduct dealing primarily with the Internet browser prevented the browser from evolving into a rival for Microsoft’s operating system, Windows. Earlier, the government negotiated a consent decree with Microsoft limiting excl...

2009
Sandra Rueda Yogesh Sreenivasan Trent Jaeger

Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, mechanisms that offer controlled interaction among VMs are immature. Some VM systems include flexible policy models and some enable MLS enforcement, but the flexible use of policy to control VM interactions has not bee...

Journal: :The Permanente journal 2013
Shamir O Cawich Ingrid A Tennant Clarence D McGaw Hyacinth Harding Christine A Walters Ivor W Crandon

CONTEXT Infection control interventions are important for containing surgery-related infections. For this reason, the modern operating room (OR) should have well-developed infection control policies. The efficacy of these policies depends on how well the OR staff adhere to them. There is a lack of available data documenting adherence to infection control policies. OBJECTIVE To evaluate OR sta...

1996
Tin Qian Willy Liao

Traditional security models are mostly centralized, coarse grained and static. They are not suitable for large distributed and anonymous evironments like internet. With the increasing importance of internet and highspeed networking, it is essential to provide a security model that could incorporate application speciic security policies dynamicaly and eeeciently. In this paper we proposed a new ...

2009
Adam Lackorzynski Alexander Warg

The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future. Recent developments in the embedded computing technology offer more performance thereby facilitating applications of unprecedented utility. Open systems, such as Linux, provide access to a huge software base. Nevertheless, these systems have to coexist with critic...

Journal: :Hawaii medical journal 2001
L Tungpalan S Y Tan

Patients with do-not-resuscitate (DNR) orders may elect to have palliative surgery. Should DNR orders be automatically suspended in the operating room (OR)? This article addresses the following issues: (1) Ethics of DNR orders. (2) The American Society of Anesthesiology's Ethical Guidelines for the Anesthesia Care of Patients with Do-Not-Resuscitate Orders or Other Directives that Limit Treatme...

2008
Anupam Joshi

This paper describes an approach that integrates declarative policies, context, OS level device control, and existing carrier authentication techniques to control access to features of mobile devices for web applications. The approach builds upon a body of existing work and adapts it to the mobile handset scenario.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید