نتایج جستجو برای: authority delegation

تعداد نتایج: 29831  

Journal: :International Journal of Multicultural and Multireligious Understanding 2023

The withdrawal of authority from the regional government to central in mineral and coal mining activities causes all them become legal. This study aims (1) analyze Regional Government Minerba (2) Lampung Provincial Government's Policy on impact Mining based principles Sustainable Development. method used is normative research statutory approach. results this are Regency/City was withdrawn by Ce...

2015
Owen Arden Jed Liu Andrew C. Myers

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence how authority is delegated between principals. We argue that interactions between information flow and au...

2015
Patrick Bolton Wouter Dessein Peter Eső Meg Meyer Benny Moldovanu Inés Moreno de Barreda Marco Ottaviani Sven Rady Joel Sobel

Two divisions of a firm, overarched by a headquarters, are engaged in a decision problem. Division one obtains information and informs division two who has the formal authority to make the decision. Headquarters guides the decision process by affecting the quality of information that division one obtains. In equilibrium, division one honestly communicates the inferences drawn from...

2006
Dongwan Shin

Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents a role-based approach to modeling trust and authority for open and distributed computing environments. Specifically, our approach centers on the extension of role-based capability delegation from local domains to trust...

Journal: :EURASIP J. Wireless Comm. and Networking 2016
Zhitao Guan Jing Li Ying Zhang Ruzhi Xu Zhuxiao Wang Tingting Yang

With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. However, due to the risks associated with security and privacy, mobility security protection in MCC has become an important issue. In this paper, we propose an efficient traceable access...

2003
Daniel R. Shiman

British economic decline in the late nineteenth and early twentieth centuries has been attributed to the growing inability of British industries to compete technologically and organizationally with their American and German competitors. This paper argues that British firms' growth and adaptability were hampered by organizational weakness and that the major cause of Britain's managerial problems...

2007
Tuan-Anh Nguyen David W. Chadwick Bassem Nasser

A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information and knowledge in order to meet common objectives. This requires dynamic security policy management. We propose an authorisation policy management model called recognition of authority (ROA) which allows dynamically trusted aut...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید