نتایج جستجو برای: integrity approach
تعداد نتایج: 1352060 فیلتر نتایج به سال:
A full realization of the Wide Area Augmentation System (WAAS) is intended to provide aircraft guidance throughout the en route, terminal, non-precision and precision approach phases of ight. The most demanding phase is precision approach where vertical positioning accuracy of ones of meters is necessary. Integrity Supported by FAA Grant 95-6-005. requirements ensuring safety of life specify th...
This paper presents the high order frequency-amplitude relationship for nonlinear transversely vibrating beams with odd and even nonlinearities, using Homotopy Perturbation Method with an auxiliary term (HPMAT). The governing equations of vibrating buckled beam, beam carrying an intermediate lumped mass, and quintic nonlinear beam are investigated to exhibit the reliability and ability of the p...
We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...
Data integrity is a fundamental aspect of computer security that has attracted much interest in recent decades. Despite a general consensus for the meaning of the problem, the lack of a formal definition has led to spurious claims such as “tamper proof”, “prevent tampering”, and “tamper protection”, which are all misleading in the absence of a formal definition. Ashman recently proposed a new a...
We describe an approach to control-flow integrity protection for real-time systems. We present TrackOS , a security-aware realtime operating system. TrackOS checks a task’s control stack against a statically-generated call graph, generated by an abstract interpretationbased tool that requires no source code. The monitoring is done from a dedicated task, the schedule of which is controlled by th...
Observing that the ever-increasing availability of WiFi-enabled gadgets is forming a technological basis for networked ad-hoc communities, and noting that such communities are actually user groups calling for group management schemes, we propose in this position paper a new group integrity management approach in support of mobile ad-hoc communities. This approach, based on our earlier work in t...
An integrity policy defines the situations when modification of information is authorised and is enforced by the protection mechanisms of a system. Traditional models of protection tend to define integrity in terms of ad-hoc authorisation techniques whose effectiveness are justified more on the basis of experience and ”best practice” rather than on any theoretical foundation. In a complex appli...
a special class of cubic graphs are the cycle permutation graphs. a cycle permutation graph pn(α) is defined by taking two vertex-disjoint cycles on n vertices and adding a matching between the vertices of the two cycles.in this paper we determine a good upper bound for tenacity of cycle permutation graphs.
oxidative stress has been identified as a crucial factor leading to male infertility largely due to peroxidativedamage to the sperm cell membrane. cadmium (cd) is a widespread environmental pollutant and oneof the well-known reproductive toxicants. because of its long biological half-life (10–30 years), cdaccumulates in the biological systems. the present study was designed to assess the concen...
Human lifespan is positively correlated with childhood intelligence, as measured by psychometric (IQ) tests. The strength of this correlation is similar to the negative effect that smoking has on the life course. This result suggests that people who perform well on psychometric tests in childhood may remain healthier and live longer. The correlation, however, is debated: is it caused exclusivel...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید