نتایج جستجو برای: authority delegation

تعداد نتایج: 29831  

2009
Jordi Blanes i Vidal Marc Möller Ricardo Alonso Antonio Cabrales Wouter Dessein Luis Garicano Thomas Kittsteiner

We study a team whose members choose a joint project and exert individual efforts to implement it. Members have private information about the productivities of alternative projects. We find conditions under which information fails to be shared and the most productive project fails to be selected. While the concealment of information can be efficient, the team’s incentive to conceal is inefficie...

2007
Niels Jørgensen

Delegation of authority is the basic approach to coordination of work in FreeBSD, an open source software (OSS) project that develops and maintains an operating system. This essay combines a software engineering perspective with a knowledge creation perspective to discuss three central mechanisms in FreeBSD: (1) motivation, (2) quality control by frequent building, and (3) bugfixing by parallel...

2010
Veliko Ivanov Monika Tzaneva Alexandra Murdjeva Valentin S. Kisimov

In the paper are presented solutions for securing the core University Business Processes. A Method for identification which Business processes are critical for security point of view, on which is required to pay more attention for its securing. For securing of the elected Business processes is developed a new security system – Extended Certification Authority. Special Secure eDocument Managemen...

2003
Vijay Bharadwaj

We describe an architecture and algorithms for deriving an access control policy by composing access control requirements specified at multiple levels in a command hierarchy. Our method can detect conflicts in requirements, and find a policy that maximally satisfies the requirements, by satisfying higher priority requirements at the expense of lower priority ones. It also allows for easy verifi...

2010
BENGT HOLMSTROM Patrick Bolton Pablo Casas-Arce Meg Meyer Enrico Perotti David Scharfstein Chris Snyder

The formal literature on firm boundaries has assumed that ex post conflicts are resolved through bargaining. In reality, parties often simply exercise their decision rights. We develop a model, based on shading, in which the use of authority has a central role. We consider two firms deciding whether to adopt a common standard. Nonintegrated firms may fail to coordinate if one firm loses. An int...

Journal: :IACR Cryptology ePrint Archive 2015
Jianting Ning Xiaolei Dong Zhenfu Cao Lifei Wei

As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this critical functionality, hindering the...

Journal: :Khulna University studies 2022

This paper concerns the issues about institutional improvement through rearrangement for better functioning of urban services by public sector bodies. It studies conflict and arrangements development management institutions focusing on Khulna Development Authority (KDA) City Corporation (KCC), in particular. contains discussion problems that are encountered KCC KDA with respect to their functio...

Journal: :Applied sciences 2021

As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, server has privacy issues, including personal information requires help a Trusted Third Party (TTP) for sharing. because value increases, owner who produces must become subject In this study, we use key aggregate sear...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید