نتایج جستجو برای: discretionary power
تعداد نتایج: 489315 فیلتر نتایج به سال:
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by Web, Java and CORBA. The authorization scheme is based on structures and concepts introduced in Web, Java and CORBA for security. A discretionary prototype is presented here, where the solutions adopted involving a concrete scheme are discussed. This scheme was develope...
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme for large-scale networks that is based on structures and concepts introduced in Web, Java and CORBA for security. This scheme is being developed in order to deal with management of security policies in large-scale netwo...
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
This paper examines how server marketing claims of high reliability (e.g., 99.999%) stack up against real world data measurements. Our goals were to: measure discretionary NFS data availability, compare data availability between standalone and clustered systems, and draw some conclusions about best practices for customers. We explain our methodology for measuring, filtering, and categorizing av...
Abstract When is state coercion for the provision of public goods justified? And how should social surplus be distributed? Philosophers approach these questions by distinguishing between essential and discretionary goods. This article explains intractability this distinction, presents two upshots. First, if governments provide configurations that simultaneously serve purposes, scope justifiable...
We present a theory for comparing the expressive power of access control models. The theory is based on simulations that preserve security properties. We perceive access control systems as state-transition systems and present two kinds of simulations, reductions and state-matching reductions. In applying the theory, we highlight four new results and discuss these results in the context of other...
This research aims to discuss the concept of investigators' discretionary power in applying their powers and authorities confiscation state assets shifting terms discretion from Act No. 14 2014 concerning Government Administration 11 2022 Job Creation. discussion provide clarity on investigators which is still controversial various aspects so that not only acceptable power, but also legally mor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید