نتایج جستجو برای: policy framework
تعداد نتایج: 698440 فیلتر نتایج به سال:
In this lecture, we use Schumpeterian growth theory, where growth comes from qualityimproving innovations, to elaborate a theory of growth policy and to explain the growth gap between Europe and the US. Our theoretical apparatus systematizes the case-by-case approach to growth policy design. The emphasis is on three policy areas that are potentially relevant for growth in Europe, namely: compet...
Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such policies often prove inadequate...
The IETF working groups such as Integrated Services (called "intserv") and RSVP [1] have developed extensions to the IP architecture and the best-effort service model so that applications or end users can request specific quality (or levels) of service from an internetwork in addition to the current IP best-effort service. Recent efforts in the Differentiated Services Working Group are also dir...
Nowadays we are witnessing the democratization of cloud services. As a result, more and more endusers (individuals and businesses) are using these services for achieving their electronic transactions (shopping, administrative procedures, B2B transactions, etc.). In such scenarios, personal data is generally flowed between several entities and end-users need (i) to be aware of the management, pr...
The Arts and Humanities Data Service (AHDS) has been established by the Joint Information Systems Committee of the UK's Higher Education Funding Councils to collect, preserve and promote re-use of digital resources which result from or support research and teaching in the arts and humanities. Within the UK, the Digital Archiving Working Group (DAWG) has been formed to co-ordinate research into ...
We present a formal, logical framework for the representation and analysis of an expressive class of authorization and obligation policies. Basic concepts of the language and operational model are given, and details of the representation are defined, with an attention to how different classes of policies can be written in our framework. We show how complex dependencies amonst policy rules can b...
Modern speaker verification systems rely on a variety of input sources in making a decision on the validity of an identity claim. The meaning of the evidence these sources produce must be reconciled if robust decisions are to be made. In the case of Conversational Biometrics (CB), for example, this is typically accomplished via the specification of a verification policy implemented as a finite ...
Security policies are widely used across the IT industry in order to secure environments. Firewalls, routers, enterprise application or even operating systems like Windows and Unix are all using security policies to some extent in order to secure certain components. In order to automate enforcement of security policies, security policy languages have been introduced. Security policy languages t...
In this article, the authors explore the definition of a knowledge society and why such a society is desirable in the development of nations. First, this paper reviews the literature on knowledge societies and notes a gap in qualitative approaches which are amenable for framing development knowledge policies. The authors then describe a conceptual framework that depicts a knowledge society in t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید