Results 11 to 20 of about 3,133,021 (299)

Who were the urban gentry? Social elites in an English provincial town, c.1680-1760 [PDF]

open access: yes, 2011
This paper explores the identity and social worlds of the ‘urban gentry’ of Chester as they developed from the late seventeenth to the mid eighteenth century.
Stobart, Jon
core   +1 more source

A Corpus-Based Study of Deontic Modality in Legal Discourse

open access: yesRasprave Instituta za Hrvatski Jezik i Jezikoslovlje, 2022
This article contributes to the study of English deontic modal means as a key linguistic phenomenon. It responds to the need of a systematic analysis of English deontic modal auxiliaries used in international legal documents of various genres.
Olga Boginskaya
doaj   +1 more source

Permissible Secrets [PDF]

open access: yesThe Philosophical Quarterly, 2017
This article offers an account of the information condition on morally valid consent in the context of sexual relations. The account is grounded in rights. It holds that a person has a sufficient amount of information to give morally valid consent if, and only if, she has all the information to which she has a claim-right. A person has a claim-right to
Lazenby, Hugh, Gabriel, Iason
openaire   +2 more sources

Kur'an'da Sınırlayıcı Bir Kayıt İfadesi: Allah’ın İzni

open access: yesMarife Dini Araştırmalar Dergisi, 2022
Kur’an, insanların Allah’la, diğer insanlarla ve toplumla ilişkilerini düzenleyen; onların dünya ve ahiret hayatında mutluluğa erişme yollarını onlara sunan pek çok konuya temas etmektedir.
Ayşe Betül Oruç
doaj   +1 more source

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

A Modified FlowDroid Based on Chi-Square Test of Permissions

open access: yesEntropy, 2021
Android devices are currently widely used in many fields, such as automatic control, embedded systems, the Internet of Things and so on. At the same time, Android applications (apps) always use multiple permissions, and permissions can be abused by ...
Hongzhaoning Kang   +4 more
doaj   +1 more source

Free choice and contextually permitted actions [PDF]

open access: yes, 1996
We present a solution to the paradox of free choice permission by introducing strong and weak permission in a deontic logic of action. It is shown how counterintuitive consequences of strong permission can be avoided by limiting the contexts in which an ...
Dignum, F.P.M.   +2 more
core   +3 more sources

Guest editorial foreword to the special issue on intelligent computation for bioinformatics [PDF]

open access: yes, 2008
Copyright [2008] IEEE. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Brunel University's products or services.
Liu, X, Wang, Z
core   +1 more source

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]

open access: yes, 2011
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre   +3 more
core   +8 more sources

About the Forms of Existence of the Legal Interest of Taxpayer

open access: yesСибирское юридическое обозрение, 2018
On the basis of doctrinal provisions the article deals with the problem of legal existence of the taxpayer's legal interest. The author analyzes the normative and non-normative (natural-legal) points of view and concludes that these two legal approaches ...
S. A. Yadrikhinskii
doaj   +1 more source

Home - About - Disclaimer - Privacy