نتایج جستجو برای: access control policy acp

تعداد نتایج: 1825945  

Journal: :isecure, the isc international journal of information security 0
m. safarzadeh m. taghizadeh b. zamani b. tork ladani

one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...

Journal: : 2022

This paper shows that average collection period of trade receivables (ACP) and a deterioration in the credit quality both have negative effect on firm value. Evidence is based Turkish industrial firms listed Borsa Istanbul over 2005-2017 period. The exists only for whose increased by more than thirty days within last one to three years. Similarly, value consequence ACP holds high-profit firms, ...

2011
Nirmal Dagdee Ruchi Vijaywargiya

Various research efforts are in progress to enforce credential based access control using XACML standard. The current standard of XACML supports attribute based access control [4,5,9,19]. While XACML accepts certified attributes through digital certificates, it does not support credential based access control in which the access conditions are defined not only in terms of credential attributes ...

Journal: :European journal of paediatric dentistry : official journal of European Academy of Paediatric Dentistry 2012
B Kargul B Altinok R Welbury

AIM Casein phosphopeptide stabilised amorphous calcium phosphate (CPP-ACP) has been shown to remineralise enamel subsurface lesions. The aim of this study was to determine the effect of a paste containing 10% CPP-ACP (Toothmousse; GC) on enamel surface microhardness in vitro. MATERIALS AND METHODS Thirty enamel blocks (3x2 mm) were prepared for the study group from the buccal surface of ex...

2010
Mohd Anwar Zhen Zhao Philip W. L. Fong

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and Trust Management Systems. Thi...

Journal: :Journal of insect physiology 2000
Xia Dean Judge Gillespie Clarkson Charnley

A comparison has been made between the effects of wounding, chemical stimulation of the immune system and fungal infection on acid phosphatase (AcP) activity in the haemolymph of the desert locust, Schistocerca gregaria. Untreated control locusts had constitutive levels of AcP. As a lysosomal enzyme, AcP may have a role in autophagy and cell turn over as well as defence. Injection of saline and...

Journal: :Future Generation Comp. Syst. 2007
Xukai Zou Yuan-Shun Dai Xiang Ran

Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing is the collaboration of multiple entities to perform collaborative tasks that rely on two fundamental functions: communication and resource sharing. Since the Internet is not security-oriented by design, there exist v...

2005
Rafae Bhatti Daniel Sanz Elisa Bertino Arif Ghafoor

Authorization and access control in Web services is complicated by the unique requirements of the dynamic Web services paradigm. Amongst them is the requirement for a context-aware access control specification and a processing model to apply fine-grained access control on various components of a Web service. In this paper, we address these two requirements and present a policy-based authorizati...

2007
Marty Humphrey Sang-Min Park Jun Feng Jason Hogg Blair Dillaway

Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. In this paper, we explicitly identify requirements for an access control policy language for Grid data and then consider six specific data access use-cases that have been problematic in today’s Grids: attribute-based acces...

2014
Yongchao Li You Li Linzhang Wang Guanling Chen

XACML has become increasingly popular for specifying access control policies in mission critical domains to protect sensitive resources. However, manually crafted XACML policies may contain errors which can only be identified with manual policies review. Recent progress in policy testing still requires tedious and inefficient manual efforts to compose access requests. In this paper, we propose ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید