نتایج جستجو برای: professional delegation

تعداد نتایج: 114894  

2003
Andreas Roider

Delegation of Authority as an Optimal (In)complete Contract The present paper aims to contribute to the literature on the foundations of incomplete contracts by providing conditions under which simple delegation of authority is the solution to the complete-contracting problem of the parties. We consider a hold-up framework where both parties profit from an investment that raises the value of an...

2008
Meriam Ben-Ghorbel-Talbi Frédéric Cuppens Adel Bouhoula

The paper presents revocation schemes in role-based access control models. We are particularly interested in two key issues: how to perform the revocation and how to manage the revocation policy. We show how to deal with these two aspects in our delegation model based on the OrBAC formalism and its administration licence concept. This model provides means to manage several types of of delegatio...

1999
GARY YUKL PING PING FU

Few studies have identi®ed determinants of delegation and consultation. To investigate this question further, we surveyed managers and subordinates in two samples and interviewed managers individually or in focus groups. The use of delegation and consultation with individual subordinates was determined in part by characteristics of the subordinates and the manager±subordinate relationship. More...

2010
Patrick Doherty Fredrik Heintz David Landén

Collaborative robotic systems have much to gain by leveraging results from the area of multi-agent systems and in particular agent-oriented software engineering. Agent-oriented software engineering has much to gain by using collaborative robotic systems as a testbed. In this article, we propose and specify a formally grounded generic collaborative system shell for robotic systems and human oper...

2003
Tieyan Li

Large amount of digital content would be stored safely in peer-to-peer network, with encrypted format. Being requested, a cipher text is downloaded from certain peer and decrypted by a delegated decryptor to obtain the clear text. Observing the need for this new kind of delegation decryption service, we propose a novel time constraint delegation scheme for decrypting p2p data in this paper. The...

Journal: :IACR Cryptology ePrint Archive 2011
Kai-Min Chung Yael Tauman Kalai Feng-Hao Liu Ran Raz

We consider the problem of delegating computation, where the delegator doesn’t even know the input to the function being delegated, and runs in time significantly smaller than the input length. For example, consider the setting of memory delegation, where a delegator wishes to delegate her entire memory to the cloud. The delegator may want the cloud to compute functions on this memory, and prov...

Journal: :Information & Software Technology 2012
Karsten Sohr Mirco Kuhlmann Martin Gogolla Hongxin Hu Gail-Joon Ahn

Context. Role-based access control (RBAC) has become the de facto standard for access management in various large-scale organizations. Often rolebased policies must implement organizational rules to satisfy compliance or authorization requirements, e.g., the principle of separation of duty (SoD). To provide business continuity, organizations should also support the delegation of access rights a...

Journal: :فقه و اصول 0

undoubtedly, legislation in any governmental system is based on its intellectual – philosophical foundations and special ideology. hence, in an islamic society, religious rules must be criteria of legislation in order to make those laws authentic and valid for the people. in this research, we have reviewed the historical past of the argument shortly, and have studied various possibilities for c...

2002
Levent Koçkesen Efe A. Ok

January 2002 (First version: November 1998) Many strategic interactions in the real world take place among delegates empowered to act on behalf of others. Although there may be a multitude of reasons why delegation arises in reality, one intriguing possibility is that it yields a strategic advantage to the delegating party. In the case where only one party has the option to delegate, we analyze...

2009
Khaled Gaaloul François Charoy

e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید