نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
Economic advancement of society is accompanied by social phenomena various nature. Hence, there a need for legal regulation such relations: characterization relations; definition the parties, regime matter those relations, plus sanctioning non-performance or improper performance law. The paper discusses legalization unauthorized construction objects that entails to study in theory possibility r...
In this paper, we address the problem of unauthorized inference of confidential information in the field of health care and social information systems. More precisely, we will focus on the problem of inference control of confidential information from statistical databases which contain information about patients and propopse a method based on fuzzy logic to avoid unauthorized inference. Informa...
In the U.S. media, unauthorized immigrants are often interchangeably referred to as "illegal aliens," "illegal immigrants," and undocumented immigrants." In spite of formal equivalence, these terms carry different connotations, but the effects of these labels on people's attitudes toward immigrants are not well documented. In this replication study, 274 undergraduate students in psychology resp...
Using the attribution Theory, the study examines the relative trust loss in a hacking versus unauthorized information sharing by a Website. An experiment was conducted in which the respondents were asked to view a website and answer questions related to their trust, at two different phases both before and after reading the news scenario. The results of the study show that users experience signi...
The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the c...
Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید