نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

Journal: :international journal of health policy and management 0
oliver razum department of epidemiology and international public health, school of public health, bielefeld university, bielefeld, germany judith wenner department of epidemiology and international public health, school of public health, bielefeld university, bielefeld, germany kayvan bozorgmehr department of general practice and health services research, university hospital heidelberg, heidelberg, germany

recourse to a purported ideal of societal homogeneity has become common in the context of the refugee reception crisis – not only in japan, as leppold et al report, but also throughout europe. calls for societal homogeneity in europe originate from populist movements as well as from some governments. often, they go along with reduced social support for refugees and asylum seekers, for example i...

Journal: :Publications of the Research Institute for Mathematical Sciences 1977

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

2007
Colin Gordon Leo Meyerovich Joel Weinberger Shriram Krishnamurthi

Abstract State Machines (asms) offer a formalism for describing state transitions over relational structures. This makes them promising for modeling system features such as access control, especially in an environment where the policy’s outcome depends on the evolving state of the system. The current notions of modularity for asms, however, provide insufficiently strong guarantees of consistenc...

2010
Martin Knechtel

Access restrictions are essential in standard information systems and became an issue for ontologies in the following two aspects. Ontologies can represent explicit and implicit knowledge about an access policy. For this aspect we provided a methodology to represent and systematically complete role-based access control policies. Orthogonally, an ontology might be available for limited reading a...

Journal: :Journal of Computer and System Sciences 2023

Random access machines (RAMs) and random stored-program (RASPs) are models of computing that closer to the architecture real-world computers than Turing (TMs). They also convenient in complexity analysis algorithms. The relationships between RAMs, RASPs TMs well-studied. However, clear their quantum counterparts still missing literature. We fill this gap by formally defining (QRAMs) (QRASPs) cl...

2010
Martin Knechtel Rafael Peñaloza

Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on assigning a label, representing its access level, to each consequence from a given ontology. However, a security administrator might not be satisfied with the access level obtained through these methods. In this case, o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید