Results 31 to 40 of about 1,730,729 (295)
On Quantitative Security Policies [PDF]
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO +2 more
openaire +2 more sources
Immigration: Visa Security Policies [PDF]
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends
Wasem, Ruth Ellen
core +2 more sources
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Securing Java with Local Policies. [PDF]
We propose an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Policies are defined by usage automata, that recognize the forbidden execution histories. Programmers can sandbox an untrusted piece of code with a policy, which is enforced at run-time through its local scope.
M. Bartoletti +4 more
openaire +7 more sources
Directed Security Policies: A Stateful Network Implementation
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg +2 more
core +2 more sources
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
Security Policy Alignment: A Formal Approach [PDF]
Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks, firewalls and employee behavior, and this refinement ...
Pieters, W., Dimkov, T. and Pavlovic, D.
openaire +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source

