نتایج جستجو برای: supporting identity
تعداد نتایج: 247699 فیلتر نتایج به سال:
This study describes the first isolation of hemorrhagic metalloproteinase HR1b from the venom of Okinawa habu, and its cDNA cloning. The substrate specificity of isolated HR1b definitely differed from that of HR1a, further supporting the presence of a metalloproteinase distinguishable from HR1a in the venom of Okinawa habu. The deduced amino acid sequence of HR1b showed 99.67% identity with HR1...
Privacy is recognized as a fundamental issue for the provision of context-aware services. In this paper we present work in progress regarding the definition of a comprehensive framework for supporting context-aware services while protecting users’ privacy. Our proposal is based on a combination of mechanisms for enforcing context-aware privacy policies and k -anonymity. Moreover, our proposed t...
Predicate encryption has an advantage over traditional publickey or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definition...
Teacher action and change is a complex nuanced phenomenon that has been theorized across diverse literature in terms of identity, agency, power. Drawing on this literature, article offers specific articulations teacher identity as interpretive framework, power legitimate action, agency moral coherence. We posit model understood the interplay individual beliefs, values, ideals with institutional...
This chapter investigates how organizations can be supported in selecting and implementing Identity and Access Management (IAM) services. Due to the ever growing number of applications that are being used in organizations, stricter regulations and changing relationships between organizations, a new approach towards loginand password administration, security and compliance is needed. IAM service...
Dominant inherited optic atrophy is usually a stationary disorder with typical findings of temporal optic nerve pallor, abnormal distance acuity, minimal visual-field defects, and characteristic color confusions in the blue-green region of the spectrum. Variability in the severity of these abnormalities is common, even within the same family. In patients with minimal disease, distance acuity ma...
Studies were made on the identity of human and monkey mononuclear leukocytes permissive to antibody-enhanced dengue 2 virus (D2V) infection. In cultures of peripheral blood leukocytes (PBL) inoculated immediately after separation, it was concluded that only mononuclear phagocytes support dengue infection. This is based upon observations that D2V-permissive cells were resistant to 1,200 rads, we...
This article is focused on providing some insight into the requirements for a non-contact continuous identity authentication system using radar sensing technologies. also discusses basic principles supporting potential new role of technologies in broad area applications. It highlights challenges associated with this technology and provides direction what needed to address real-world
Multireceiver encryption enables a sender to encrypt a message and transmit the ciphertext to a set of authorized users while no one outside this set can decrypt the message, which is known as an efficient protocol to achieve a secure multicast data communication among multiple authorized users. In this work, we construct two identitybased multireceiver encryption schemes (one is based on compo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید