نتایج جستجو برای: access control policy acp

تعداد نتایج: 1825945  

Journal: :IACR Cryptology ePrint Archive 2011
Sascha Müller Stefan Katzenbeisser

Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor by enforcing access rules in a cryptographic way. However, ABE has a privacy problem: The access policies are sent in clear along with the ciphertexts. Further generalizing the idea of p...

2017
Panagiotis Vasilikos Flemming Nielson Hanne Riis Nielson

Access control policies are essential to determine who is allowed to access data in a system without compromising the data’s security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while also on other attributes of the environment such as the time. In this paper, we use systems of Tim...

2012
Subhash Chandra Patel Lokendra Singh Umrao Ravi Shankar Singh

Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User of the cloud outsourced their sensitive data and information to cloud provider’s...

Journal: :dental research journal 0
maryam hajenorouzali tehrani maryam ghafournia pooran samimi omid savabi iman parisay navid askari

background: some studies have shown that casein phosphopeptide-amorphous calcium phosphate (cpp-acp) and acidulated phosphate fluoride (apf) gel can protect teeth against erosion. the aim of this study was to assess whether cpp-acp and fluoride could reduce enamel wear rates under erosive conditions simulating abrasion and acidic diet regimen. materials and methods: enamel specimens consisted o...

2002
Salvador Abreu

In this article we describe the mechanisms offered by the ISCO [2, 1] language for defining and implementing access control and homologation, within the scope of a large-scale information system. ISCO is a Logic-based system which integrates multiple heterogenous information sources such as classical relational databases or LDAP directories. The rule-based access control mechanisms present in I...

2016
Zeynep Aslı Güçlü Alev Alaçam Nichola Jayne Coleman

This 12-week clinical study evaluated the impact of 10% CPP-ACP and 5% sodium fluoride varnish regimes on the regression of nonorthodontic white spot lesions (WSLs). The study included 21 children with 101 WSLs who were randomised into four treatment regimes: weekly clinical applications of fluoride varnish for the first month (FV); twice daily self-applications of CPP-ACP paste (CPP-ACP); week...

2005
Amril Syalim Toshihiro Tabata Kouichi Sakurai

There are many situations where users of databases cannot fully trust the administrators of databases where they store their data. In this paper we propose a partially outsourced access control model for such databases. In this model, access control to databases is partially outsourced to third parties. The tasks of the third parties are: partially mediates access control to databases and parti...

2010
Richard Dennis

The monetary policy literature assumes increasingly that policies are formulated according to the timeless perspective (Woodford, 1999a). However, treating the auxiliary state variables that characterize the timeless perspective equilibrium appropriately when evaluating policy performance, this paper shows that discretionary policymaking can be superior to timeless perspective policymaking and ...

2015
Savita Kumra

There is little doubt that the large law firm has undergone huge transformation in the last three decades. This has been as a consequence of widespread change in practice realities, resulting in changing market dynamics, fiercer competition for clients, and alterations in career paths, where individuals have moved from a largely internal labor market structure to a “boundaryless” model. Further...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید