Results 31 to 40 of about 119,685 (321)
3PAC: Enforcing Access Policies for Web Services [PDF]
Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.
Bemmel, J. van +2 more
core +2 more sources
Academic freedom in Europe: time for a Magna Charta? [PDF]
This paper is a preliminary attempt to establish a working definition of academic freedom for the European Union states. The paper details why such a definition is required for the European Union and then examines some of the difficulties of defining ...
A Arblaster +50 more
core +1 more source
We have developed a Pd‐catalyzed oxidative cyclopropanation of 1,n‐enynes employing cyclic diacyl peroxides as bifunctional reagents that serve as both tether‐tunable oxidants and spatially controlled dicarboxylate anions. ABSTRACT Bicyclo[n.1.0]alkanes are highly valuable scaffolds in drug discovery and synthetic chemistry.
Ting Yuan, Lei Shi
wiley +1 more source
The Effect of Subjecting Zoning Plan Changes to Annulment During an Active Lawsuit
Both administrative and judicial system courts can only decide on matters that have been requested of them. However, administrative courts in practice make an exception to this rule, particularly for zoning plans.
Halil Altındağ
doaj +1 more source
The Doctrine of Collateral Estoppel in Parole Revocation [PDF]
In recent years courts have shown more recognition of the rights of parolees and probationers. Spurred by a Supreme Court decision that certain due process protections were applicable to parole revocation procedures, revocation hearings are now ...
Reilly, Patrick M.
core +1 more source
RITM: Revocation in the Middle
Although TLS is used on a daily basis by many critical applications, the public-key infrastructure that it relies on still lacks an adequate revocation mechanism.
Chuat, Laurent +3 more
core +1 more source
Competition Policy and Agribusiness in the Biden Administration
ABSTRACT The Biden Administration pursued a set of ambitious competition policy initiatives in agriculture and agribusiness, primarily aimed at livestock and poultry supply chains, farm inputs, and food retailing. The initiatives included expanded antitrust enforcement; new US Department of Agriculture (USDA) contract regulations requiring poultry ...
James M. MacDonald
wiley +1 more source
Key Management in Wireless Sensor Networks
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency.
Ismail Mansour +2 more
doaj +1 more source
Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
With the widespread application of cloud storage, users could obtain many conveniences such as low-price data remote storage and flexible data sharing.
Xiaodong Yang +4 more
doaj +1 more source
Vehicular Ad hoc Networks (VANETs) are a subset of the Internet of Things (IoT) that are used in smart traffic applications. Due to their high speed, mobility, and exposure to the environment, the security requirements for VANETs result in the ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +1 more source

