Results 241 to 250 of about 2,449,057 (299)
Achieving bottom-up ethical, legal, and societal implications and responsible research and innovation in the synthetic biology research community from the Japanese context. [PDF]
Matsuo M +4 more
europepmc +1 more source
EdgeGuard-AI: Zero-Trust and Load-Aware Federated Scheduling for Secure and Low-Latency IoT Edge Networks. [PDF]
Alanazi AG, Alanazi HA.
europepmc +1 more source
School Meals as a Strategy to Prevent Childhood Obesity and Advance Food Equity: A Narrative Review. [PDF]
McLoughlin GM, Cohen JF.
europepmc +1 more source
MHBDS: Healthcare blockchain data sharing scheme based on SMPC and TRP-PBFT. [PDF]
Zhang L, Luo J, Hao Z, Yang Q.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security Policies and Security Models
1982 IEEE Symposium on Security and Privacy, 1982We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Joseph A. Goguen, José Meseguer 0001
openaire +1 more source
Security policies for downgrading
Proceedings of the 11th ACM conference on Computer and communications security, 2004A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release (i.e., declassification) where appropriate. This paper presents security policies for downgrading and a security type system that incorporates them, allowing secure ...
Stephen Chong, Andrew C. Myers
openaire +1 more source
Security Policies for Databases
IFAC Proceedings Volumes, 1992Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
G. Pernul, A.M. Tjoa
openaire +1 more source

