نتایج جستجو برای: administrator

تعداد نتایج: 4932  

2001
Arthur Fisher

Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...

2008
Riza Aditya Byoungcheon Lee Colin Boyd Ed Dawson

Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...

2006
Marietta Del Favero

In this article the authors examine characterizations of faculty-administrator relationships, in particular as related to shared governance. Two primary perspectives guided the study. The first perspective focused on the fragile nature of shared governance, characterized by a lack of harmony and mistrust. The second perspective focused on the root of faculty-administrator tension as both cultur...

2013
Deborah A P Hersman

(vi) Sensitive security information, as defined at 49 U.S.C. 40119 and 49 CFR 15.5. (3) Nothing in this section shall be interpreted as preventing the Administrator from releasing to the respondent information in addition to that which is contained in the releasable portion of the EIR. Likewise, nothing in this section shall be interpreted as preventing the Administrator from releasing to the r...

1992
William Kent Rafi Ahmed Joseph Albert Mohammad A. Ketabchi Ming-Chien Shan

In the Pegasus prototype multidatabase system, the key to the problem of object identity is a differentiation between the view of a data administrator, capturing all the underlying discrepancies and their solutions, and the view of an end user or application, in which only a consistent result is visible. New language constructs with which the administrator can describe solutions to identity pro...

2003
Deirdre Hurley

.........................................................................................................2 Introduction....................................................................................................2 Top 10 Mistakes .............................................................................................3 1. Allowing Null Sessions ..........................................

1990
Thomas Egebo Pete Richardson

Thomas Egebo is an Administrator in Economic Prospects Division, Pete Richardson is the Head of the Econometric Unit and lan Lienert, previously an Administrator in Growth Studies Division, is now an Economist in the African Department of the International Monetary Fund. Special thanks go to John Martin and the referees for comments on earlier drafts and also to David Reifschneider, now at the ...

2007
William Yurcik Ramona Su Thompson Esa Rantanen

System administrators are users too and there have been few user studies of them in the security domain. This paper describes the challenges we faced in designing and performing studies of security system administrators using visualization tools as well as our experiences in addressing these challenges.

2007
Mats Andersson

In this paper, dynamic aspects of railway infrastructure operation and maintenance costs in Sweden are explored. Econometric cost functions are estimated to check the robustness of previous marginal cost estimates by introducing lags and leads of both dependent and independent variables. We find support for a forward-looking behaviour within the Swedish National Rail Administration (Banverket) ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید