Results 201 to 210 of about 189,829 (257)
Medical security for rare disease patients in China: Insights from patients with Dravet syndrome. [PDF]
Wu J +9 more
europepmc +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
US. Security Policy and Counterterrorism in Southeast Asia.
David García Cantalapiedra
doaj
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security Policies for Databases
IFAC Proceedings Volumes, 1992Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
G. Pernul, A.M. Tjoa
openaire +1 more source
Germany’s troubled security policy
Adelphi Series, 2018‘Without doubt, this is the right book at exactly the right time! Despite COVID's media predominance, the dangers to our freedom have not simply faded away; quite the opposite.
Bastian Giegerich, Maximilian Terhalle
openaire +1 more source
Computers & Security, 1990
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire +1 more source
Security Policies and Security Models
1982 IEEE Symposium on Security and Privacy, 1982We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
J. A. Goguen, J. Meseguer
openaire +1 more source
German Diplomatic Security Policy
2019Since the end of the Cold War, counterterrorism has joined traditional counterintelligence concerns at the top of the German diplomatic security agenda. Germany has designated diplomatic security predominantly as a responsibility of the police, and has tasked the German Federal Police (Bundespolizei) with the lead role in providing security for its ...
Brummer, Klaus, Krotz, Ulrich
openaire +1 more source

