نتایج جستجو برای: implementation of access control

تعداد نتایج: 21307868  

B. Tork Ladani B. Zamani M. Safarzadeh M. Taghizadeh

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

abstract: one of the most visited & important spaces in different countries by tourist are urban areas. the old tehran which major part is located in district 12 is historical showcase of the capital, but, its hiidden cultural attraction is not used as it should be. this thesis occasionally engage in studying the efficacy of correct installation of travel guide boards in welfare & easily acc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1393

this exploratory study aimed to investigate a possible relationship between learners’ beliefs about language learning and one of their personality traits; that is,locus of control (loc). both variables, beliefs and locus of control, are assumed to influence the language learning process. the internal control index (ici) and the beliefs about language learning inventory (balli) were administered...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1392

this study investigated the impact of explicit instruction of morphemic analysis and synthesis on the vocabulary development of the students. the participants were 90 junior high school students divided into two experimental groups and one control group. morphological awareness techniques (analysis/synthesis) and conventional techniques were used to teach vocabulary in the experimental groups a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

some researches made in the field of agency problem issue, deal with the role of control systems regarding owners and managers. in this research the relationship between the two control mechanisms, namely the voluntary disclosure (external control mechanism) and outside directors (internal control mechanism), which are reductive of agency problems, has been studied. for this reason, a sample ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده زبانهای خارجی 1391

the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1381

‏‎this study investigated the effect of prior knowledge on the listening comprehension performance of fl learners. twenty students, male and female, drawn from the two intact groups of the senior and junior english language and literature majors were chosen as the participants of this study . the two groups were then randomly assigned into the experimental and control group. the experimental gr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1391

the present study aimed to investigate the possible effects of focused highlighted error feedback on grammatical accuracy of writing among iranian intermediate efl learners. after selecting 52 homogenous participants from among 70 university students attending azad university of rasht and randomly dividing them into two intact groups of 26 students, the researcher exposed the participants of th...

2006
Urs Hengartner Peter Steenkiste

In pervasive computing environments, information gateways derive specific information, such as a person’s location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided by a service becomes difficult when a client does not have access rights to this data. For example, a client might have access to a person’s locat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید