نتایج جستجو برای: authorized exploiters

تعداد نتایج: 6369  

2014

(e) The unrestricted rates authorized under this subpart shall be shown on the appropriate regular or special schedule or as an amendment to the schedule and shall indicate the wage area (or part thereof) and each occupation or occupational specialization and grade for which the rates are authorized. These rates shall be paid by all agencies having such positions in the wage area (or part there...

Journal: :Journal of Computer Security 2002
Pierre Bieber Jacques Cazin Pierre Girard Jean-Louis Lanet Virginie Wiels Guy Zanon

This paper presents an approach enabling a smart card is-suer to verify that a new applet securely interacts with already down-loaded applets. A security policy has been deened that associates levels to applet attributes and methods and deenes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We il...

Journal: :International Journal of Safety and Security Engineering 2021

2015
Swati Jagtap

Vehicle identification plays important role in Intelligent Transportation System. Vehicle is identified uniquely by its number plate. It is used for applications like identification of authorized vehicles, providing controlled access to restricted areas, and law enforcement. In the proposed system the license number of the car is checked against the database of authorized users and only authori...

Journal: :CoRR 2004
Sudhir Kumar Singh R. Srikanth

A restriction on quantum secret sharing (QSS) that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provid...

2014
Fred B. Schneider

A set can be defined intensionally by specifying properties required of all its members or it can be defined extensionally by enumerating its elements. For example, the set of people authorized to enter a nightclub might be characterized intensionally by giving a minimum required age or characterized extensionally by providing a guest list. The DAC and MAC authorization policies we have been st...

2004
Sean Smith Nicholas C. Goffee Sung Hoon Kim Punch Taylor Meiyuan Zhao John Marchesini

Wireless networks break the implicit assumptions that supported authorization in wired networks (that is: if one could connect, then one must be authorized). However, ensuring that only authorized users can access a campus-wide wireless network creates many challenges: we must permit authorized guests to access the same network resources that internal users do; we must accommodate the de-centra...

Journal: :Pain management nursing : official journal of the American Society of Pain Management Nurses 2013
Maureen F Cooney Michelle Czarnecki Colleen Dunwoody Nancy Eksterowicz Sandra Merkel Linda Oakes Elsa Wuhrman

The American Society for Pain Management Nursing (ASPMN) has updated its 2007 position statement on the use of authorized agent controlled analgesia (AACA) for patients who are unable to independently utilize patient-controlled analgesia (PCA). ASPMN continues to support the use of AACA to provide timely and effective pain management while promoting equitable care for vulnerable patient populat...

2009
Giuliano Armano Eloisa Vargiu

Setting up a marine reserve involves access monitoring, with the goal of avoiding intrusions of not authorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Nowadays, intrusion detection in marine reserves is carried out by using radar systems or suitable cameras activated by movement sensors. In this paper, we present a multiagent system ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید