Results 91 to 100 of about 1,730,729 (295)

On Reductions from Multi-Domain Noninterference to the Two-Level Case

open access: yes, 2016
The literature on information flow security with respect to transitive policies has been concentrated largely on the case of policies with two security domains, High and Low, because of a presumption that more general policies can be reduced to this two ...
van der Meyden, Ron, Woizekowski, Oliver
core   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Demokrat Parti Döneminde Asayiş Bağlamında Uyuşturucu Sorunu: Politika, Toplum ve Güvenlik Üzerindeki Etkileri

open access: yesTurkish Academic Research Review
XX.Yüzyılın başlarından itibaren uyuşturucu maddeler, uluslararası bir sorun haline gelmeye başlamıştır. Bu maddelerin kontrolü, denetimi, üretimi ve ticaretinin engellenmesi amacıyla çeşitli uluslararası toplantılar düzenlenmiş ve önlemler alınmıştır ...
Lütfi Arslan
doaj   +1 more source

Security Analysis of Role-based Access Control through Program Verification

open access: yes, 2012
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction based tools available for program verification.
Ferrara, Anna Lisa   +2 more
core   +2 more sources

Terahertz Channel Modeling, Estimation and Localization in RIS‐Assisted Systems

open access: yesAdvanced Electronic Materials, EarlyView.
Reconfigurable intelligent surfaces have become a recent intensive research focus. Based on practical applications, channel strategies for RIS‐assisted terahertz wireless communication systems are categorized into three different types: channel modeling, channel estimation, and channel localization.
Hongjing Wang   +9 more
wiley   +1 more source

Discourses on Violence in Costa Rica, El Salvador, and Nicaragua: Youth, Crime, and the Responses of the State [PDF]

open access: yes
The paper analyzes the social construction of youth violence in Nicaragua, Costa Rica, and El Salvador on the one hand, and the related security policies of the three states, on the other.
Peter Peetz
core  

Chronic Disease Monitoring Using Advanced Compliant Materials for Bioelectronics

open access: yesAdvanced Electronic Materials, EarlyView.
Compliant bioelectronic systems enable continuous monitoring of chronic disease through soft, stretchable materials and tissue‐conformal designs that support stable electrophysiological, mechanical, and biochemical sensing. Integration of diverse sensing modalities with thoughtful material selection, device architectures, and advanced fabrication ...
Han Kim   +7 more
wiley   +1 more source

Justice implications of health and food security policies for Indigenous peoples facing COVID-19: a qualitative study and policy analysis in Peru. [PDF]

open access: yesHealth Policy Plan, 2023
Chicmana-Zapata V   +17 more
europepmc   +1 more source

Executable Security Policies: Specification and Validation of Security Policies

open access: yes, 2009
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies.
Ryma Abassi, Sihem Guemara El Fatmi
openaire   +1 more source

Estimating Historical Energy Security Costs [PDF]

open access: yes
Energy Security is of increasing importance in today’s world, yet little research has been carried out on the costs or benefits of energy security policies.
Arnold, Steve   +2 more
core  

Home - About - Disclaimer - Privacy