نتایج جستجو برای: mandatory access control

تعداد نتایج: 1624921  

2001
Serge E. Hallyn Phil Kearns

Domain and Type Enforcement (DTE) is a mechanism that can be effective in providing extremely fine-grained mandatory access control in complex networked systems. Unfortunately, this level of control comes at a price: the configuration of a DTE policy is usually in the form of a dense ASCII file which does not lend itself to an understanding or administration of the policy itself. We describe a ...

2004
Makan Pourzandi

With the increasing use of clusters in different domains, efficient and flexible security has now become an essential requirement for clusters, though many security mechanisms exist, there is a need to develop more flexible and coherent security mechanisms for large distributed applications. In this paper, we present the need for a unified cluster wide security space for large distributed appli...

Journal: :CoRR 2016
Zhiyong Shan

Today, security threats to operating systems largely come from network. Traditional discretionary access control mechanism alone can hardly defeat them. Although traditional mandatory access control models can effectively protect the security of OS, they have problems of being incompatible with application software and complex in administration. In this paper, we propose a new model, Suspicious...

2013
Raymond Leung Joe Ilsever

Prior studies illustrate the issues of agency theory stemmed from the separation between ownership and management. As such, information asymmetry between the agent and principal is the major reason why agent can take advantages from adverse selection and moral hazard, which is the obvious problem in recent accounting scandals. Boards of directors therefore have fiduciary duties to exercise effe...

2013
Marshall H. Medoff

Since the Supreme Court’s 1973 decision legalizing abortion, many states have enacted laws restricting women’s access to an abortion. There has been considerable empirical research on the impact of these restrictive state abortion laws on women’s pregnancy resolution decisions. This paper reviews the empirical evidence regarding restrictions on abortion access. The empirical evidence indicates ...

2013
Jeremy Bertomeu

This paper offers a unified treatment of truthful communication in the context of the sale of an asset under incomplete information. Among other things, the framework accommodates general assumptions about reporting costs, information endowments, the language of communication or the productive uses of information. I show that this class of problems admits a unique perfect sequential rational ex...

2000
Sylvia Osborn Ravi Sandhu Qamar Munawer

Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the tradition...

Journal: :The Journal of the Korean Institute of Information and Communication Engineering 2011

2015
Maarten C.W. Janssen Santanu Roy

Competition creates strategic incentives for firms to communicate private information about product quality through signalling rather than voluntary disclosure. In a duopoly where firms may disclose quality before setting prices and prices may signal quality, non-disclosure by all firms may often be the unique symmetric outcome even if disclosure cost vanishes. A high-quality firm may not discl...

Journal: :International Journal of Intelligent Computing Research 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید