نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

Journal: :تحقیقات اقتصاد و توسعه کشاورزی ایران 0
سیدصفدر حسینی استاد اقتصاد کشاورزی، دانشکدة اقتصاد وتوسعة کشاورزی، دانشگاه تهران محمدرضا پاکروان دانشجوی دکتری اقتصاد کشاورزی، دانشکدة اقتصاد و توسعة کشاورزی، دانشگاه تهران میلاد اتقایی کارشناس ارشد اقتصاد کشاورزی، دانشکدة اقتصاد و توسعة کشاورزی، دانشگاه تهران

considering the importance of agriculture sector for production, employment and establishing food security, different countries include developed and developing ones, support mentioned sectors in various ways. present study investigates the effects on government support policies on iran's food security using vecm and time series data of 1990-2010. results revealed that government support p...

Journal: :J. High Speed Networks 2006
Luay A. Wahsheh Jim Alves-Foss

One fundamental key to successful implementation of secure high assurance computer systems is the design and implementation of security policies. For systems enforcing multiple concurrent policies, the design and implementation is a challenging and difficult task. To simplify this task, we present an Inter-Enclave Multi-Policy (IEMP) paradigm for information access of the Multiple Independent L...

2007
Brian J. Corcoran Nikhil Swamy Michael Hicks

Provenance and security are intimately related. Cheney et al. [3] show that the dependencies underlying provenance information also underly information flow security policies. Provenance information can also play a role in history-based access control policies [1]. Many real applications have the need to combine a variety of security policies with provenance tracking. For instance, an online st...

Journal: :حقوق خصوصی 0
عهدیه السادات افضلی حسینی دانشجوی کارشناسی ارشد حقوق خصوصی، دانشگاه آزاد اسلامی کرمان محمدرضا امیرمحمدی استادیار گروه حقوق خصوصی ، دانشگاه شهید باهنر کرمان ایوب احمد پور گهرت استادیار گروه حقوق خصوصی ، دانشگاه شهید باهنر کرمان

one of the main objectives of development policies in different countries is food security. extensive researches around the world specially during last decades show the role of nutrition in health, food security, increase of efficiency and economic development. considering that a healthy diet and having access to sufficient and healthy foods are the basic human rights, governments are obliged t...

Journal: :CoRR 2012
Othman Benammar Hicham Elasri Abderrahim Sekkaki

Management of security policies has become increasingly difficult given the number of domains to manage, taken into consideration their extent and their complexity. Security experts has to deal with a variety of frameworks and specification languages used in different domains that may belong to any Cloud Computing or Distributed Systems. This wealth of frameworks and languages make the manageme...

2007
Laurie J. Kirsch Scott R. Boss

Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the last line – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow secu...

2004
Keara Barrett

The concept of exploiting context information to produce dynamically adapting, accurate and timely security policies for pervasive environments and the entities of these environments are discussed briefly in this paper. The challenges relating to the effective establishment and enforcement of security policies in unpredictable pervasive environments are outlines, along with issues faced in the ...

Journal: :CoRR 2000
Carlos Ribeiro André Zúquete Paulo Ferreira Paulo Guedes

With the advent of wide security platforms able to express simultaneously all the policies comprising an organization’s global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and between security policies and other specificati...

2004
Mariela Pavlova Gilles Barthe Lilian Burdy Marieke Huisman Jean-Louis Lanet

Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security properties, stating for example that no pin verification must take place within a transaction. Behavioural interface specification languages, such as JML (Java Modeling Language), have been successfully used to valid...

2001
Carlos Ribeiro André Zúquete Paulo Ferreira Paulo Guedes

Most organizations use several security policies to control different systems and data, comprising in this way a global complex policy. These security policies are often scattered over different environments, each one with its own security model and domain of administration, making them difficult to administer and understand. Moreover, some applications (e.g. workflow), often need to cross seve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید