نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :iranian journal of allergy, asthma and immunology 0
mahmoud abbasi department of medical ethics, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iran ehsan shamsi gooshki department of medical ethics, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iran neda allahbedashti department of medical ethics, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iran

abortion traditionally means miscarriage and is still known as a problem, which societies have been trying to reduce its rate by using legal means. despite the fact that  pregnant women and fetuses have been historically supported;  abortion  was firstly criminalized in 1926 in iran, 20 years after establishment of modern legal system. during next 53 years this situation changed dramatically, t...

2010
Elizabeth Van Ruitenbeek Ken Keefe William H. Sanders

To provide insight on system security and aid decision-makers, we propose a method to quantitatively evaluate the strength of a system’s security. Our approach is to create an executable state-based security model of the system under attack. In this paper, we focus on the development of the adversary attack behavior model, which is one part of the overall security model. We show how three key a...

2013
Michael D. Ford Ken Keefe Elizabeth LeMay William H. Sanders Carol Muehrcke

The ADversary VIew Security Evaluation (ADVISE) model formalism provides a system security model from the perspective of an adversary. An ADVISE atomic model consists of an attack execution graph (AEG) composed of attack steps, system state variables, and attack goals, as well as an adversary profile that defines the abilities and interests of a particular adversary. The ADVISE formalism has be...

2010
Raphael C.-W. Phan John N. Whitley David J. Parish

This paper revisits the conventional notion of security, and champions a paradigm shift in the way that security should be viewed: we argue that the fundamental notion of security should naturally be one that actively aims for the root of the security problem: the malicious (human-terminated) adversary. To that end, we propose the notion of adversarial security where non-malicious parties and t...

Journal: :IACR Cryptology ePrint Archive 2011
Chunming Tang Shuhong Gao Chengli Zhang

—Any linear code can be used to construct a linear secret sharing scheme. In this paper, it is shown how to decide optimal linear codes (i.e., with the biggest information rate) realizing a given access structure over finite fields. It amounts to solving a system of quadratic equations constructed from the given access structure and the corresponding adversary structure. The system becomes a li...

Journal: :مجله دانشکده حقوق و علوم سیاسی 0
محسن صادقی

hans kelsen is one of the most famous legal philosophers in the entire world that his legal thoughts have always been drawing attention and critics. pure theory of law, unity of law system and logic of law system are his the most famous theories . in this article, we put forward these theories and challenge them.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده حقوق 1388

چکیده ندارد.

پایان نامه :دانشگاه بین المللی امام خمینی (ره) - قزوین - دانشکده علوم اجتماعی 1387

چکیده ندارد.

Journal: :SSRN Electronic Journal 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید