Executable Security Policies: Specification and Validation of Security Policies
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies.
Ryma Abassi, Sihem Guemara El Fatmi
openaire +1 more source
Enclosing the Global Plant Genetic Commons [PDF]
Looks at policies related to the development, use, and control of plant genetic resources, with a focus on property rights in relation to changing technology and its impact on food security in developing ...
Robert W. Herdt
core
How AI Shapes the Future Landscape of Sustainable Building Design With Climate Change Challenges?
This review examines how artificial intelligence reshapes sustainable building design faced with climate change challenges. The authors synthesize existing studies to demonstrate AI's transformative potential across design lifecycle phases from climate‐aware form generation to performance optimization.
Pengyuan Shen +5 more
wiley +1 more source
Executable Security Policies: Specification and Validation of Security Policies
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies.
openaire +1 more source
Social Security in Developing Countries: Myth or Necessity? Evidence from India [PDF]
This paper discusses the importance of social security policies in developing economies, using empirical evidence from India. The paper discusses the viability of implementing systems of social protection in developing countries and provides an empirical
Patricia Justino
core
Redefining the Health Risk of Battery Materials Through a Biologically Transformed Metal Mixture
Inhaled NCM particles undergo lysosomal degradation, releasing complex ion mixtures that induce systemic impact. The impact is determined by a critical balance between antagonistic Ni‐Co interactions and synergistic Mn effects. To capture these complexities in risk assessment, we develop an IAI model, ensuring a more accurate quantitative risk ...
Ze Zhang +11 more
wiley +1 more source
An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. [PDF]
Kisekka V, Goel S.
europepmc +1 more source
Oil Security Short- and Long-Term Policies [PDF]
Increasing oil security represents one of the most important policy actions, especially within IEA countries. Short and long term mechanisms could help such goal.
Francesco Gracceva, Valeria Costantini
core
Scalable Upcycling of Spent Lithium‐Ion Battery Anodic Graphite to Electronic‐Grade Graphene
Graphite anodes from spent lithium‐ion batteries are upcycled into electronic‐grade graphene nanoplatelets for highly conductive screen printing inks (> 104 S m−1). Screen‐printed micro‐supercapacitors confirm the utility of the upcycled graphene (1.78 mF/cm2 capacitance for > 10 000 cycles). Life cycle assessment and techno‐economic analysis highlight
Janan Hui +8 more
wiley +1 more source
Security Policies Approached by Value Analysis Concepts [PDF]
This paper intends to redefine the role of the end users of the Internet facilities, in the process of creation of more secure transactions on the Internet, in respect of their privacy.
Florin Buhociu +2 more
core

