نتایج جستجو برای: enforcement mechanisms

تعداد نتایج: 555562  

2012
Natalia Criado Estefania Argente Vicent J. Botti Pablo Noriega

In this paper, we propose that agents make decisions about norm compliance based on three different factors: self-interest, enforcement mechanisms and internalised emotions. Different agent personalities can be defined according to the importance given to each factor.

2002
Chienting Lin Paul Jen-Hwa Hu Jennifer Schroeder Hsinchun Chen

This study purports to develop and empirically examine a model for explaining technology acceptance decisions by individual law enforcement officers. Specifically, we describe the research model and hypotheses, detail our study design, and highlight important results from a pretest study that included 42 detectives and police officers from the Tucson Police Department (TPD). Based on the pretes...

2006
W. Bentley MacLeod

This paper discusses the literature on the enforcement of incomplete contracts. It compares legal enforcement to enforcement via relationships and reputations. A number of mechanisms, such as the repeat purchase mechanism (Klein and Le er (1981)) and e ciency wages (Shapiro and Stiglitz (1984)), have been o ered as solutions to the problem of enforcing an incomplete contract. It is shown that t...

2011
Christopher Marquis Jianjun Zhang Yanhua Zhou

This article analyzes the closing gap between regulation and enforcement of environmental protection in China and explores its implications for doing business there. It identifies three major dimensions that characterize change in regulatory systems: priorities and incentives, bureaucratic alignment, and transparency and monitoring. Using these dimensions, it describes the mechanisms that chara...

1978
W. Bentley MacLeod

This paper discusses the literature on the enforcement of incomplete contracts. It compares legal enforcement to enforcement via relationships and reputations. A number of mechanisms, such as the repeat purchase mechanism (Klein and Leffler (1981)) and efficiency wages (Shapiro and Stiglitz (1984)), have been offered as solutions to the problem of enforcing an incomplete contract. It is shown t...

2011
JULIANA GEORGIEVA MARIANA GORANOVA

The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach — security services that can be developed and tested and applied against many types o...

Journal: :CoRR 2018
Bo Wu Jin Dai Hai Lin

Opacity is a confidentiality property that characterizes the non-disclosure of specified secret information of a system to an outside observer. In this paper, we consider the enforcement of opacity within the discrete-event system formalism in the presence of multiple intruders. We study two cases, one without coordination among the intruders and the other with coordination. We propose appropri...

2014
Florian Kelbert Alexander Pretschner

Data usage control provides mechanisms for data owners to remain in control over how their data is used after it has been shared. Many data usage policies can only be enforced on a global scale, as they refer to data usage events happening within multiple distributed systems: ‘not more than three employees may ever read this document’, or ‘no copy of this document may be modified after it has b...

2011
Pierpaolo Degano Gian Luigi Ferrari Gianluca Mezzetti

We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two enforcement mechanisms of our quantitative s...

1997
Jussipekka Leiwo Yuliang Zheng

Information security is based on access control models and cryptographic techniques These are well established areas of research in computer security but are not capable of supporting development of comprehensive information security within organizations There is a need to study upper level issues and to provide with organizational mechanisms to identify security enforcement mechanisms and spec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید