نتایج جستجو برای: access control policy acp
تعداد نتایج: 1825945 فیلتر نتایج به سال:
In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users’ access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user’s private key, and the ciphertext-policy i...
We investigate conditional expressions in the setting of ACP, an algebraic theory about processes. We introduce ACP, an extension of ACP with conditional expressions in which the conditions are taken from a free Boolean algebra over a set of generators, and also its main models, called full splitting bisimilation models. We add two simple mechanisms for condition evaluation to ACP; and we show ...
The new European Union (EU) chemicals regulation, the Registration, Evaluation and Authorisation of Chemicals, or REACH, went into effect in 2007. In the extensive advance discussion of the expected impacts of REACH, questions were raised about the effects of this new chemical policy on developing countries. In particular, will it harm the economies of the group of African, Caribbean and Pacifi...
This manuscript describes vertical profiles of aerosol number density over Arctic during spring and summer and presents authentic and original scientific material that has relevant implications for atmospheric science (aerosol, clouds, CCN, and others). This study is based on very important aerosol data over Ny-Ålesund, Svalbard, although the tethered-balloon-borne aerosol measurements are rest...
Original Research | Volume 4 | Number 1| 1 Copyright 2018 by Powers JS. This is an open-access article distributed under Creative Commons Attribution 4.0 International License (CC BY 4.0), which allows to copy, redistribute, remix, transform, and reproduce in any medium or format, even commercially, provided the original work is properly cited. cc Context Academic primary care geriatric clinic....
This paper proposes a policy-based access control mechanism for the personal information directory service systems which prevents the information users from illegally accessing the personal information and enables the information subjects to control access to their own information. In the proposed mechanism, the individuals’ personal information which is encrypted with different keys is stored ...
background and purpose: health indices, regarding to their role in the development of society, are one of the most important indices at national level. success of national development programs is largely dependent on the establishment of appropriate goals at the health sector, among which access to healthcare facilities is an essential requirement. the aim of this study was to examine the dispa...
We propose here a mechanism for history-dependent access control for a distributed object-oriented system, implemented using reflection. In a history-dependent access control system, access is decided based not only on the current request, but also on the previous history of accesses to some entity or service. We consider timing constraints expressed using temporal logic, and we describe a poss...
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can potentially reduce the customer response time by pre-computing the access control rights based on policies.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید