Results 211 to 220 of about 7,372,576 (288)
Some of the next articles are maybe not open access.
Security Policies and Security Models
1982 IEEE Symposium on Security and Privacy, 1982We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
J. A. Goguen, J. Meseguer
openaire +2 more sources
Circulation, 2022
Nutritionally inadequate dietary intake is a leading contributor to chronic cardiometabolic diseases. Differences in dietary quality contribute to socioeconomic and racial and ethnic health disparities.
A. Thorndike +9 more
semanticscholar +1 more source
Nutritionally inadequate dietary intake is a leading contributor to chronic cardiometabolic diseases. Differences in dietary quality contribute to socioeconomic and racial and ethnic health disparities.
A. Thorndike +9 more
semanticscholar +1 more source
Land Use Policy, 2019
Ensuring food security is one of the main challenges of the 21st century in developing countries. The aim of this study is to analyze how public policies contribute to the strengthening of family farming in order to increase the food security.
I. I. Berchin +7 more
semanticscholar +1 more source
Ensuring food security is one of the main challenges of the 21st century in developing countries. The aim of this study is to analyze how public policies contribute to the strengthening of family farming in order to increase the food security.
I. I. Berchin +7 more
semanticscholar +1 more source
Security Policies for Databases
IFAC Proceedings Volumes, 1992Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
G. Pernul, A.M. Tjoa
openaire +1 more source
Germany’s troubled security policy
Adelphi Series, 2018‘Without doubt, this is the right book at exactly the right time! Despite COVID's media predominance, the dangers to our freedom have not simply faded away; quite the opposite.
Bastian Giegerich, Maximilian Terhalle
openaire +1 more source
Computers & Security, 1990
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
German Diplomatic Security Policy
2019Since the end of the Cold War, counterterrorism has joined traditional counterintelligence concerns at the top of the German diplomatic security agenda. Germany has designated diplomatic security predominantly as a responsibility of the police, and has tasked the German Federal Police (Bundespolizei) with the lead role in providing security for its ...
Brummer, Klaus, Krotz, Ulrich
openaire +1 more source
Medical Database Security Policies
Methods of Information in Medicine, 1993AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care.
openaire +2 more sources
Information security policies’ compliance: a perspective for higher education institutions
Journal of Computational Information Systems, 2020Sadaf Hina, P. Dhanapal, Durai Dominic
semanticscholar +1 more source

