نتایج جستجو برای: authority delegation
تعداد نتایج: 29831 فیلتر نتایج به سال:
We study a team whose members choose a joint project and exert individual efforts to implement it. Members have private information about the productivities of alternative projects. We find conditions under which information fails to be shared and the most productive project fails to be selected. While the concealment of information can be efficient, the team’s incentive to conceal is inefficie...
Delegation of authority is the basic approach to coordination of work in FreeBSD, an open source software (OSS) project that develops and maintains an operating system. This essay combines a software engineering perspective with a knowledge creation perspective to discuss three central mechanisms in FreeBSD: (1) motivation, (2) quality control by frequent building, and (3) bugfixing by parallel...
In the paper are presented solutions for securing the core University Business Processes. A Method for identification which Business processes are critical for security point of view, on which is required to pay more attention for its securing. For securing of the elected Business processes is developed a new security system – Extended Certification Authority. Special Secure eDocument Managemen...
We describe an architecture and algorithms for deriving an access control policy by composing access control requirements specified at multiple levels in a command hierarchy. Our method can detect conflicts in requirements, and find a policy that maximally satisfies the requirements, by satisfying higher priority requirements at the expense of lower priority ones. It also allows for easy verifi...
The formal literature on firm boundaries has assumed that ex post conflicts are resolved through bargaining. In reality, parties often simply exercise their decision rights. We develop a model, based on shading, in which the use of authority has a central role. We consider two firms deciding whether to adopt a common standard. Nonintegrated firms may fail to coordinate if one firm loses. An int...
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the...
This paper concerns the issues about institutional improvement through rearrangement for better functioning of urban services by public sector bodies. It studies conflict and arrangements development management institutions focusing on Khulna Development Authority (KDA) City Corporation (KCC), in particular. contains discussion problems that are encountered KCC KDA with respect to their functio...
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, server has privacy issues, including personal information requires help a Trusted Third Party (TTP) for sharing. because value increases, owner who produces must become subject In this study, we use key aggregate sear...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید