نتایج جستجو برای: permission

تعداد نتایج: 26829  

1997

This article presents the formalisation of the weak and strong permission in deontic logic based on the logic of enactment. A permission that follows from the absence of a prohibition, we call a weak permission; this permission is not enacted. A strong permission is always enacted (implicitly or explicitly), and implies a giving choice. The distinction between these two types of permission is a...

Journal: :JSW 2016
Lukas Aron Petr Hanácek

This paper discusses the implementation of protecting user's data on mobile device based on Android platform. The mobile platform surpasses computers in its popularity in many aspects of one daily routine. Protection of data is one of the basic security feature of each operating system. Android platform raise its protection with every new version of the system. This paper covers the new approac...

2013
Amitav Acharya

The impact of ideas and norms on world politics has received a good deal of attention in recent scholarship on international relations. Much of this effort was initially directed at engaging rationalist international relations theory on the causal and transformative impact of ideational forces vis-à-vis power and interest. But after gaining ground in this debate, idea scholars have now turned t...

2011
Guido Governatori Francesco Olivieri Antonino Rotolo Simone Scannapieco

In this paper we propose an extension of Defeasible Logic to represent different concepts of defeasible permission. Special attention is paid in particular to permissive norms that work as exceptions to opposite obligations.

2001
Pete Epstein Ravi S. Sandhu

In this paper, we develop a model for engineering role-permission assignment. Our model builds upon the well-known RBAC96 model [SCFY96]. Assigning permissions to roles is considered too complex an activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. We specifically introduce the concept of Jobs, Work-patterns, and Tasks to facilitate rolepermi...

Manafi, Farzad , Mehrabani, Davood , Nabavizadeh, Seyedeh Leila , Vahedi, Zabihallah ,

In recent years, the cloning technology has remarkably developed Iran, but unfortunately, the required legal framework has not been created to support and protect such developments yet. This legal gap may lead to abuse of scientific researches to obtain illegal benefits and to undermine the intellectual property rights of scientists and researchers. Thus to prevent such consequences, the attemp...

Journal: :Archives of disease in childhood 1991
J M Fell G W Rylance

One hundred and fifty parents of emergency paediatric admissions were interviewed; 60 of 106 (57%) blood samples were taken and 107 of 120 (89%) treatment regimens were instituted without their permission. Furthermore, the reasons for over half the blood tests and 31% of the drug treatments were not explained.

2008
Tyler Close

Mashups, web applications that interact with other web applications, are receiving increasing developer interest and providing users with valuable new functionality. When one or more of the interacting applications have access control requirements, many design challenges arise. Failure to meet these challenges brings unnecessary risk to the user. Addressing the challenges using a poorly suited ...

Journal: :Anadolu Kliniği Tıp Bilimleri Dergisi 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید