نتایج جستجو برای: risk control

تعداد نتایج: 2149199  

2008

Despite of the importance of records management (RM) in helping law firms manage legal, financial and organizational risk, many firms currently lack effective RM policies and systems. The rise of e-mail and other electronic content has led to the emergence of separate content silos and duplicative RM processes, increasing cost and complexity. Cumbersome, out-of-date systems challenge compliance...

Journal: :JORS 2015
Mario Guajardo Mikael Rönnqvist Ann Mari Halvorsen Svein Inge Kallevik

We address a problem of inventory management of spare parts in the context of a large energy company, producer of oil and gas. Spare parts are critical for assuring operational conditions in offshore platforms. About 200,000 different items are held in several inventory plants. The inventory system implemented at the company corresponds to a min-max system. The control parameters are decided ba...

2000
Shashi Kant

In the developing economies, optimal forest regimes should incorporate the socio-economic characteristics of the user groups. And, since socio-economic factors will change with time, optimal forest regimes will also follow a dynamic path. The two most important socio-economic factors are the heterogeneity of the user group with respect to forest management and the direct dependence of the user ...

2011
Haifeng Zhang Jie Zhang Ping Li Michael Small Binghong Wang

Usually, whether to take vaccination or not is a voluntary decision, which is determined by many factors, from societal factors (such as religious belief and human rights) to individual preferences (including psychology and altruism). Facing the outbreaks of infectious diseases, different people often have different estimations on the risk of infectious diseases. So, some persons are willing to...

2014
Roberto Marinho Carla Merkle Westphall Gustavo Roecker Schmitt

This paper aims to provide a model for dynamic risk assessment for the RAdAC model supported by the use of ontologies to perform the calculation of risk. From the mapping of the different variables involved in the calculation of risk into axioms of an ontology, it is possible to dynamically infer the risk of access to specific data based on the available risk factors and their weights. Keywords...

2017
Selma Metintaş Hasan Fevzi Batırel Hasan Bayram Ülkü Yılmaz Mehmet Karadağ Güntülü Ak Muzaffer Metintaş

Malignant mesothelioma (MM) is an important health problem due to ongoing asbestos exposure. Environmental asbestos exposure leads to a high risk of MM in Turkey. The Turkish Mesothelioma Working Group and the Turkish Public Health Institute designed and performed the Turkey National Mesothelioma Surveillance and Environmental Asbestos Exposure Control Program (TUNMES-EAECP). The aim of this st...

2009
János Ivanyos

New generations of governance models referring to either IT or Internal Control – like COBIT [1] and COSO [2] are extended with business perspective willing to gain top management’s ear. But the practice shows, this opening solely is not enough to reach a breakthrough, because models became more complicated than it could be applied without some difficulties. Very frequently exposed, that the be...

Journal: :I. J. Network Security 2016
Rang Zhou Chunxiang Xu Wanpeng Li Jining Zhao

Many ways are proposed to reduce the secret storage space of access control in hierarchy, but no one optimizes the public parameters which are only modified by CA. Length of each public parameter is one important factor for the size and utilization of storage space. The frequent changes on the maximum length of public parameter will be a weakness for stability, in dynamic key management. Number...

2012
Daniel Schmidt Karsten Berns

Risk analysis in combination with terrain classification is a common approach in mobile robotics to adapt robot control to surface conditions. But for climbing robots it is hard to specify, how the robotic system and especially the adhesion is affected by different surfaces and environmental features. This paper will introduce the climbing robot CROMSCI using negative pressure adhesion via mult...

2004
Nimal Nissanke Etienne J. Khayat

Because of its vulnerability to errors and, hence, unauthorised access, assignment of access rights is a critically important aspect of RBAC. Despite major advances in addressing this clearly using formal models, there is still a need for a more robust formulation, especially incorporating strict guidelines on assignment of access rights and how to perform such tasks as delegation of access rig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید