Results 91 to 100 of about 2,430,883 (250)

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Chinese Wall Security Policy [PDF]

open access: yes, 2009
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core   +1 more source

Social Security Policy and Vindictiveness [PDF]

open access: yes
This paper uses the work of Jock Young (2002, 2003) on the emergence of vindictiveness in late modern society to examine two recent developments – the withdrawal, in certain circumstances, of Housing Benefit from those people evicted for \'anti-social ...
Chris Grover
core  

Meeting Food Aid and Price Support Objectives through Local Grain Purchase: A Review of the 1996 Experience in Ethiopia [PDF]

open access: yes
Grain Marketing Research Project, Ministry of Economic Development and Cooperation, Addis Ababafood security, food policy, Ethiopia, food aid, Food Security and Poverty, Q18,
Anonymous
core   +1 more source

Human security: Concept and practice [PDF]

open access: yes
In the era of multiplying and escalating risks, both at national and international level, security of individual –popularly known as human security- from pervasive threats and fears become an area of intellectual discourse and policy debate.
Venu Menon, Sudha
core   +1 more source

Home - About - Disclaimer - Privacy