نتایج جستجو برای: access control policy acp
تعداد نتایج: 1825945 فیلتر نتایج به سال:
one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...
This paper shows that average collection period of trade receivables (ACP) and a deterioration in the credit quality both have negative effect on firm value. Evidence is based Turkish industrial firms listed Borsa Istanbul over 2005-2017 period. The exists only for whose increased by more than thirty days within last one to three years. Similarly, value consequence ACP holds high-profit firms, ...
Various research efforts are in progress to enforce credential based access control using XACML standard. The current standard of XACML supports attribute based access control [4,5,9,19]. While XACML accepts certified attributes through digital certificates, it does not support credential based access control in which the access conditions are defined not only in terms of credential attributes ...
AIM Casein phosphopeptide stabilised amorphous calcium phosphate (CPP-ACP) has been shown to remineralise enamel subsurface lesions. The aim of this study was to determine the effect of a paste containing 10% CPP-ACP (Toothmousse; GC) on enamel surface microhardness in vitro. MATERIALS AND METHODS Thirty enamel blocks (3x2 mm) were prepared for the study group from the buccal surface of ex...
Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and Trust Management Systems. Thi...
A comparison has been made between the effects of wounding, chemical stimulation of the immune system and fungal infection on acid phosphatase (AcP) activity in the haemolymph of the desert locust, Schistocerca gregaria. Untreated control locusts had constitutive levels of AcP. As a lysosomal enzyme, AcP may have a role in autophagy and cell turn over as well as defence. Injection of saline and...
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing is the collaboration of multiple entities to perform collaborative tasks that rely on two fundamental functions: communication and resource sharing. Since the Internet is not security-oriented by design, there exist v...
Authorization and access control in Web services is complicated by the unique requirements of the dynamic Web services paradigm. Amongst them is the requirement for a context-aware access control specification and a processing model to apply fine-grained access control on various components of a Web service. In this paper, we address these two requirements and present a policy-based authorizati...
Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. In this paper, we explicitly identify requirements for an access control policy language for Grid data and then consider six specific data access use-cases that have been problematic in today’s Grids: attribute-based acces...
XACML has become increasingly popular for specifying access control policies in mission critical domains to protect sensitive resources. However, manually crafted XACML policies may contain errors which can only be identified with manual policies review. Recent progress in policy testing still requires tedious and inefficient manual efforts to compose access requests. In this paper, we propose ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید