Results 101 to 110 of about 13,471 (161)
Multilevel barriers to dog rabies vaccination uptake in Kilosa District, Tanzania. [PDF]
Nyamhanga T, Masawe V.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Securely executing multilevel transactions
Computers & Security, 1996In this paper, we show how arbitrary multilevel transactions—transactions that have the ability to read and write data at multiple levels—can be executed using the inherently secure low-first algorithm. To this end, we combine a trusted caching facility with a multiversion timestamp ordering algorithm in a manner that is both secure and yields one-copy
Sushil Jajodia +3 more
openaire +2 more sources
Multilevel secure transaction processing
Journal of Computer Security, 2001Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols.
Jajodia, Sushil +4 more
openaire +1 more source
Multidimensional Secure Multilevel Polarization Shift Keying
Fiber and Integrated Optics, 2016We investigate a technique to improve the information confidentiality in optical fiber telecommunications. Starting from a basic scheme of unconventional coding technique [1] applied to a three-dimensional polarization shift keying, we extend the method to a four-dimensional physical space [2] to demonstrate the general applicability of the ...
G.G. Rutigliano, S. Betti, P. Perrone
openaire +1 more source
2011
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric +1 more
openaire +3 more sources
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric +1 more
openaire +3 more sources
IEEE Security & Privacy Magazine, 2004
Multilevel security is the prevention of unauthorized disclosure among multiple information classes. The threat source for the disclosures includes unauthorized users and subverted software operating on behalf of authorized users. The terminology might be more explicit if we could call this concept multidomain confidentiality, but it is worth resisting
openaire +1 more source
Multilevel security is the prevention of unauthorized disclosure among multiple information classes. The threat source for the disclosures includes unauthorized users and subverted software operating on behalf of authorized users. The terminology might be more explicit if we could call this concept multidomain confidentiality, but it is worth resisting
openaire +1 more source

