نتایج جستجو برای: access control policy acp
تعداد نتایج: 1825945 فیلتر نتایج به سال:
Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor by enforcing access rules in a cryptographic way. However, ABE has a privacy problem: The access policies are sent in clear along with the ciphertexts. Further generalizing the idea of p...
Access control policies are essential to determine who is allowed to access data in a system without compromising the data’s security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while also on other attributes of the environment such as the time. In this paper, we use systems of Tim...
Cloud Computing is a large-scale distributed computing paradigm which is based on Web Services over the Internet. Internet has many inherent security defects because of its openness. It has many other attacks and threats. One of the most challenging issue in cloud computing is access control and data security. User of the cloud outsourced their sensitive data and information to cloud provider’s...
background: some studies have shown that casein phosphopeptide-amorphous calcium phosphate (cpp-acp) and acidulated phosphate fluoride (apf) gel can protect teeth against erosion. the aim of this study was to assess whether cpp-acp and fluoride could reduce enamel wear rates under erosive conditions simulating abrasion and acidic diet regimen. materials and methods: enamel specimens consisted o...
In this article we describe the mechanisms offered by the ISCO [2, 1] language for defining and implementing access control and homologation, within the scope of a large-scale information system. ISCO is a Logic-based system which integrates multiple heterogenous information sources such as classical relational databases or LDAP directories. The rule-based access control mechanisms present in I...
This 12-week clinical study evaluated the impact of 10% CPP-ACP and 5% sodium fluoride varnish regimes on the regression of nonorthodontic white spot lesions (WSLs). The study included 21 children with 101 WSLs who were randomised into four treatment regimes: weekly clinical applications of fluoride varnish for the first month (FV); twice daily self-applications of CPP-ACP paste (CPP-ACP); week...
There are many situations where users of databases cannot fully trust the administrators of databases where they store their data. In this paper we propose a partially outsourced access control model for such databases. In this model, access control to databases is partially outsourced to third parties. The tasks of the third parties are: partially mediates access control to databases and parti...
The monetary policy literature assumes increasingly that policies are formulated according to the timeless perspective (Woodford, 1999a). However, treating the auxiliary state variables that characterize the timeless perspective equilibrium appropriately when evaluating policy performance, this paper shows that discretionary policymaking can be superior to timeless perspective policymaking and ...
There is little doubt that the large law firm has undergone huge transformation in the last three decades. This has been as a consequence of widespread change in practice realities, resulting in changing market dynamics, fiercer competition for clients, and alterations in career paths, where individuals have moved from a largely internal labor market structure to a “boundaryless” model. Further...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید