Mandatory family protection
نویسندگان
چکیده
This contribution reviews the book Mandatory family protection which focuses on rules that exist in different countries to protect members of a deceased person. Various authors describe and analyse European nations, influenced by law, China Islamic law. Other chapters are dedicated an analysis historical developments or more general, comparative perspectives.
منابع مشابه
A Family of Securable Protection Systems
This paper describes Metagap e, a formally speciied family of capability systems capable of restricting the transfer of both information and access rights. Previous work indicates that the identiication of such architectures is diicult, and in most cases their veriication is undecidable. To the best of our knowledge, Metagap e spans all real capability systems known to support the connnement pr...
متن کاملFamily planning providers' perspectives on dual protection.
CONTEXT Family planning providers can play an important role in helping women to identify their risk of HIV and other sexually transmitted diseases (STDs) and to adopt preventive measures. In-depth investigation of providers' attitudes about approaches to STD risk assessment, contraceptive counseling and dual protection--concurrent protection from STDs and unintended pregnancy--has been limited...
متن کاملA Protection Mechanism for an Intrusion Detection System Based on Mandatory Access Control
Research regarding intrusion detection systems (IDSs) has become more active with the recent increases in illegal accesses to computer systems. Many researchers focus only to the techniques or mechanisms for detecting intrusions automatically, without considering the security of IDSs themselves. When an intruder attacks and breaks into a system, he or she often deletes system logs and stops aud...
متن کاملWhat's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
The pervasiveness of security-critical external resources (e.g accessories, online services) poses new challenges to Android security. In prior research we revealed that given the BLUETOOTH and BLUETOOTH_ADMIN permissions, a malicious app on an authorized phone gains unfettered access to any Bluetooth device (e.g., Blood Glucose meter, etc.). Here we further show that sensitive text messages fr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tijdschrift erfrecht
سال: 2021
ISSN: ['1874-1681', '2468-9505']
DOI: https://doi.org/10.5553/te/187416812021022001002