Results 301 to 310 of about 550,568 (326)
Some of the next articles are maybe not open access.
Journal of Computer Science and Technology, 1987
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources
Locks, Keys and Majority Voting
Mathematics Magazine, 1979(1979). Locks, Keys and Majority Voting. Mathematics Magazine: Vol. 52, No. 3, pp. 168-171.
openaire +2 more sources
The key to the FANCD2–FANCI lock
Nature Structural & Molecular Biology, 2022Cody M. Rogers, Patrick Sung
openaire +2 more sources
Reflections on “Locks and keys to the boardroom”
Gender in Management: An International Journal, 2011PurposeThe purpose of this paper is to provide a reflection on the author's earlier paper published in Gender in Management: An International Journal (formerly Women in Management Review) in 2003 titled “Locks and keys to the boardroom”.Design/methodology/approachThe paper is examined in the context of current research and writing on women on boards ...
openaire +2 more sources
Is there a key to the normative budgeting lock?
Policy Sciences, 1996This article explores how to answer the normative question: ‘What is a good budgetary process?’ It proposes that a deliberative process involving practitioners and academics could identify and justify achievably ambitious standards for budgetary processes, and the best practices for attaining those standards.
openaire +2 more sources