نتایج جستجو برای: access control policy acp
تعداد نتایج: 1825945 فیلتر نتایج به سال:
The article covers 30 years of EU agenda on migration and development. research objective was to assess its continuity, determine the main trends, outline challenges that cooperation between ACP has face after pandemic. development proved be rather stable. However, motivates by aid while most countries do not welcome this approach. As a result, contradictions still exist, despite their formal C...
Peer data management system (PDMS) is a decentralized system, in which each peer is autonomous and has its own schema and database. With the help of pairwise schema mapping built between any two relevant peers, a query at one peer can be rewritten and broadcast to the whole PDMS. Then answers from multiple peers are returned to the querying peer. In our thesis, we exploit the access control iss...
This paper presents several very interesting diagnostics for a comprehensive process-oriented validation of CCMs and CTMs in the upper troposphere/lower stratosphere (UTLS) and their application to the GMI CTM. It hence is a valuable contribution to ongoing validation activities within the different communities (e.g. QUANTIFY or CCMVal). However, the presentation and discussion of some diagnost...
BACKGROUND Advance care planning (ACP) is a process of discussion about goals of care and a means of setting on record preferences for care of patients who may lose capacity or communication ability in the future. Implementation of ACP is widely promoted by policy makers. This study examined how community palliative care nurses in England understand ACP and their roles within ACP. It sought to ...
Without proposing a new key assignment scheme, this paper presents a graph translation procedure that can be used to enforce non-hierarchical access control policies, in addition to those in a strict hierarchy. An interesting application is also given in this paper to show the importance of non-hierarchical access control. Key-Words: Key assignment, Multilevel security, Access control, Cryptogr...
Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such models have to express organisation-specific security policies and internal controls aiming to protect information against unauthorised access and modification, and against usage of information for unintended purposes. This diss...
Calls to legalize physician-assisted suicide have increased and public interest in the subject has grown in recent years despite ethical prohibitions. Many people have concerns about how they will die and the emphasis by medicine and society on intervention and cure has sometimes come at the expense of good end-of-life care. Some have advocated strongly, on the basis of autonomy, that physician...
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specif...
with rapid development and increase in the amount of available resources in E-learning platforms, the need to design new architecture for such systems has become inevitable to improve the search quality and simplifying ways to take online courses. The integration of multi-agent systems has played a very important role in developing open, interactive and distributed learning systems. A lot of re...
Pervasive-computing infrastructures necessarily collect a lot of context information to disseminate to their context-aware applications. Due to the personal or proprietary nature of much of this context information, however, the infrastructure must limit access to context information to authorized persons. In this paper we propose a new access-control mechanism for event-based contextdistributi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید