نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...
Background & Objectives: In the chain of vehicles, human and environment, the human factors are the most complex element in the causes of road traffic injuries (RTIs). Unauthorized speeding and overtaking are considered as the main human factors resulting RTIs. This study estimated the population attributablefraction of two human factors, the most common risk factors of rural roads, of RTIs. Me...
according to civil law and shia fiqh, unauthorization is a phenomenon involved in various contracts including marriage. studies on unauthorized transactions tried to reveal the conditions of authorization, principal and authorized marriage so that principal plays no role here or is influenced. fiqh and law textbooks indicate that role of principal's intention fades gradually and are largel...
Software piracy has been studied by academics, software firms, law enforcement agents and policy makers for many years. Previous research in software piracy either did not differentiate between unauthorized copying and unauthorized sharing, or focused only on unauthorized copying. We believe the motivating factors behind the two behaviors are quite different because beneficiaries of the behavio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید