نتایج جستجو برای: multilevel security
تعداد نتایج: 204436 فیلتر نتایج به سال:
ing superclasses Objects in an object-oriented database have various relationships which have been discussed. If the designer is aware of these relationships during the design phase, many of these relationships can be exploited. For example, STUDENT is related to PERSON in that all students are people, so the commonalities between the two are extracted and placed in the class PERSON. The subcla...
This study adopts a multilevel comparative approach to investigating the degree to which Japanese work systems are implemented and internalized in the UK business system. The focus is on the limits to accepting continuous improvement schemes of Japanese multinational corporations. The paper addresses national and local institutional factors and firm-level organizational factors affecting implem...
Network Security Situation Awareness (NSSA) technology has been extensively studied in multi-data analyzing research these years. In this paper, we use a historical war story to explain the key points in situation awareness, present the conceptualizations and challenges aspects of NSSA, and discuss the methodologies of solving these problems. We provide an evaluation method for network security...
in this paper we describe multilevel security issues for a distributed database management system which operates in a limited heterogeneous environment. We first describe an architecture for such a system and then discuss techniques for query processing and transaction management. T his is the third in a series of articles that we have published in this journal on multilevel security for distri...
The classical multitrait-multimethod (MTMM) matrix can be viewed as a two-dimensional cross-classification of traits and methods. Beside commonly used analysis methods such as structural equation modeling and generalizability theory, multilevel analysis offers attractive possibilities. If the focus is only on analyzing classical MTMM data, the multilevel approach has no surplus value, because t...
Federated database systems solve the problem of sharing information among independent entities. When building and operating such a federated database system, it is necessary to protect data. Because of heterogeneities among security systems of component databases an integration of them is essential, taking into account new security features of the federation itself. This paper describes a multi...
In a multilevel secure database management system (MLSDBMS). users cleared at different security levels access and share a database consisting of data at different sensitivity levels. A powerful and dynamic approach to assigning sensitivity levels (also called security levels) to data is one which utilizes security constraints or classification rules. Security constraints provide an effective a...
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time databas...
D We present an application of metaprogramming in logic that, unlike most metaprogramming applications, is not primarily concerned with controlling the execution of logic programs. Metalevel computation is used to define theories from schemata that were either given explicitly or obtained by abstraction from other theories. Our main application is a representation of legal knowledge in a metalo...
Research in several new topologies of Multilevel inverter(MLI) has been carried out rapidly day by day. Recently several topologies have been introduced achieving higher levels with reduced device couns and DC sources .In this paper a new hybrid symmetric MLI is proposed .This topology has reduced number of controlled switches, Dc sources and numbers of capacitors which are very less compared t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید