Integrity policy unveiled at last.

نویسنده

  • Eugenie Samuel Reich
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy: Budget could send space science off in new directions at NASA.

The budget outline the White House unveiled on 28 February caps a week of startling news for NASA. On orders from the White House, NASA managers last week told Congress they intend to cancel plans for a Pluto flyby and a mission to study the solar wind. The agency is also following orders to make major cuts to the international space station after acknowledging huge cost overruns in the orbitin...

متن کامل

The Riddle of Economic Diplomacy in the Foreign Policy of the Islamic Republic of Iran

Bill Clinton, the ex-president of the United States of America at the end of his two presidency period stated that one of his most important successes was the link between internal economy and the foreign policy of the country.  Some general conclusions can be derived from this statement, which include the following and which make the hypotheses of this article: 1- Economic relations are necess...

متن کامل

SOLAR SYSTEM EXPLORATION: A More Cautious NASA Sets Plans for Mars.

Twice burned by mission failures last year, NASA managers last week unveiled a new 15-year blueprint for Mars exploration. The revamped strategy allows for doing more science, but at a slower pace, while delaying a sample return until well into the next decade.

متن کامل

Binary Integrity Constraints Against Confidentiality

Any protection mechanism opens an unexpected channel of communication, the so-called covert channel. The Integrity Checker of a database is a protection mechanism, against data inconsistencies. As such, it opens a covert channel which can be used to thwart the mechanism which ensures confidentiality. Therefore, confidential data can be unveiled leading to a « the more semantic, the less secure ...

متن کامل

Towards System Integrity Protection with Graph-Based Policy Analysis

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Nature

دوره 468 7327  شماره 

صفحات  -

تاریخ انتشار 2010