Results 11 to 20 of about 3,133,021 (299)
Who were the urban gentry? Social elites in an English provincial town, c.1680-1760 [PDF]
This paper explores the identity and social worlds of the ‘urban gentry’ of Chester as they developed from the late seventeenth to the mid eighteenth century.
Stobart, Jon
core +1 more source
A Corpus-Based Study of Deontic Modality in Legal Discourse
This article contributes to the study of English deontic modal means as a key linguistic phenomenon. It responds to the need of a systematic analysis of English deontic modal auxiliaries used in international legal documents of various genres.
Olga Boginskaya
doaj +1 more source
This article offers an account of the information condition on morally valid consent in the context of sexual relations. The account is grounded in rights. It holds that a person has a sufficient amount of information to give morally valid consent if, and only if, she has all the information to which she has a claim-right. A person has a claim-right to
Lazenby, Hugh, Gabriel, Iason
openaire +2 more sources
Kur'an'da Sınırlayıcı Bir Kayıt İfadesi: Allah’ın İzni
Kur’an, insanların Allah’la, diğer insanlarla ve toplumla ilişkilerini düzenleyen; onların dünya ve ahiret hayatında mutluluğa erişme yollarını onlara sunan pek çok konuya temas etmektedir.
Ayşe Betül Oruç
doaj +1 more source
Authorization algorithms for permission-role assignments [PDF]
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core +2 more sources
A Modified FlowDroid Based on Chi-Square Test of Permissions
Android devices are currently widely used in many fields, such as automatic control, embedded systems, the Internet of Things and so on. At the same time, Android applications (apps) always use multiple permissions, and permissions can be abused by ...
Hongzhaoning Kang +4 more
doaj +1 more source
Free choice and contextually permitted actions [PDF]
We present a solution to the paradox of free choice permission by introducing strong and weak permission in a deontic logic of action. It is shown how counterintuitive consequences of strong permission can be avoided by limiting the contexts in which an ...
Dignum, F.P.M. +2 more
core +3 more sources
Guest editorial foreword to the special issue on intelligent computation for bioinformatics [PDF]
Copyright [2008] IEEE. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Brunel University's products or services.
Liu, X, Wang, Z
core +1 more source
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre +3 more
core +8 more sources
About the Forms of Existence of the Legal Interest of Taxpayer
On the basis of doctrinal provisions the article deals with the problem of legal existence of the taxpayer's legal interest. The author analyzes the normative and non-normative (natural-legal) points of view and concludes that these two legal approaches ...
S. A. Yadrikhinskii
doaj +1 more source

