نتایج جستجو برای: authorized exploiters
تعداد نتایج: 6369 فیلتر نتایج به سال:
(e) The unrestricted rates authorized under this subpart shall be shown on the appropriate regular or special schedule or as an amendment to the schedule and shall indicate the wage area (or part thereof) and each occupation or occupational specialization and grade for which the rates are authorized. These rates shall be paid by all agencies having such positions in the wage area (or part there...
This paper presents an approach enabling a smart card is-suer to verify that a new applet securely interacts with already down-loaded applets. A security policy has been deened that associates levels to applet attributes and methods and deenes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We il...
Vehicle identification plays important role in Intelligent Transportation System. Vehicle is identified uniquely by its number plate. It is used for applications like identification of authorized vehicles, providing controlled access to restricted areas, and law enforcement. In the proposed system the license number of the car is checked against the database of authorized users and only authori...
A restriction on quantum secret sharing (QSS) that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provid...
A set can be defined intensionally by specifying properties required of all its members or it can be defined extensionally by enumerating its elements. For example, the set of people authorized to enter a nightclub might be characterized intensionally by giving a minimum required age or characterized extensionally by providing a guest list. The DAC and MAC authorization policies we have been st...
Wireless networks break the implicit assumptions that supported authorization in wired networks (that is: if one could connect, then one must be authorized). However, ensuring that only authorized users can access a campus-wide wireless network creates many challenges: we must permit authorized guests to access the same network resources that internal users do; we must accommodate the de-centra...
The American Society for Pain Management Nursing (ASPMN) has updated its 2007 position statement on the use of authorized agent controlled analgesia (AACA) for patients who are unable to independently utilize patient-controlled analgesia (PCA). ASPMN continues to support the use of AACA to provide timely and effective pain management while promoting equitable care for vulnerable patient populat...
Setting up a marine reserve involves access monitoring, with the goal of avoiding intrusions of not authorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Nowadays, intrusion detection in marine reserves is carried out by using radar systems or suitable cameras activated by movement sensors. In this paper, we present a multiagent system ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید