نتایج جستجو برای: administrator
تعداد نتایج: 4932 فیلتر نتایج به سال:
Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...
Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...
In this article the authors examine characterizations of faculty-administrator relationships, in particular as related to shared governance. Two primary perspectives guided the study. The first perspective focused on the fragile nature of shared governance, characterized by a lack of harmony and mistrust. The second perspective focused on the root of faculty-administrator tension as both cultur...
(vi) Sensitive security information, as defined at 49 U.S.C. 40119 and 49 CFR 15.5. (3) Nothing in this section shall be interpreted as preventing the Administrator from releasing to the respondent information in addition to that which is contained in the releasable portion of the EIR. Likewise, nothing in this section shall be interpreted as preventing the Administrator from releasing to the r...
In the Pegasus prototype multidatabase system, the key to the problem of object identity is a differentiation between the view of a data administrator, capturing all the underlying discrepancies and their solutions, and the view of an end user or application, in which only a consistent result is visible. New language constructs with which the administrator can describe solutions to identity pro...
.........................................................................................................2 Introduction....................................................................................................2 Top 10 Mistakes .............................................................................................3 1. Allowing Null Sessions ..........................................
Thomas Egebo is an Administrator in Economic Prospects Division, Pete Richardson is the Head of the Econometric Unit and lan Lienert, previously an Administrator in Growth Studies Division, is now an Economist in the African Department of the International Monetary Fund. Special thanks go to John Martin and the referees for comments on earlier drafts and also to David Reifschneider, now at the ...
System administrators are users too and there have been few user studies of them in the security domain. This paper describes the challenges we faced in designing and performing studies of security system administrators using visualization tools as well as our experiences in addressing these challenges.
In this paper, dynamic aspects of railway infrastructure operation and maintenance costs in Sweden are explored. Econometric cost functions are estimated to check the robustness of previous marginal cost estimates by introducing lags and leads of both dependent and independent variables. We find support for a forward-looking behaviour within the Swedish National Rail Administration (Banverket) ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید