Results 21 to 30 of about 191,712 (313)
Adaptive Security Policies [PDF]
We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be assured, that it will not be able to observe any violation of its own security policy due to the changing presence of other agents in its ...
Nielson, Flemming+2 more
openaire +3 more sources
Enforceable security policies [PDF]
A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed.
openaire +4 more sources
Games for groundwater governance: field experiments in Andhra Pradesh, India
Groundwater is a common-pool resource that is subject to depletion in many places around the world as a result of increased use of irrigation and water-demanding cash crops. Where state capacity to control groundwater use is limited, collective action is
Ruth Meinzen-Dick+6 more
doaj +1 more source
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities.
Mohammad A. Hawila, Sunil S. Chirayath
doaj +1 more source
This study reviews the Artificial Intelligence and Machine Learning approaches developed thus far for driver profile and driving pattern recognition, representing a set of macroscopic and microscopic behaviors respectively, to enhance the understanding ...
Dimitrios I. Tselentis+1 more
doaj +1 more source
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP deployment has evolved for a set of 10,000 highly ranked domains.
Roth, S+4 more
openaire +3 more sources
Combining Approaches for Systemic Behaviour Change in Groundwater Governance
Over-extraction of groundwater is a prominent challenge in India, with profound implication for food security, livelihoods, and economic development. As groundwater is an ‘invisible’ and mobile common pool resource, sustainable governance of groundwater ...
Richu Sanil+3 more
doaj +1 more source
The Hong Kong Pro-democracy Movement: Challenges and Divisions in the Past Decade [PDF]
This article is an attempt to examine the challenges to Hong Kong’s pro-democracy movement and the movement’s internal divisions in the past decade or so.
Joseph Yu-shek Cheng
doaj
Objectives Continuing medical education (CME) and work commitment are important for rural healthcare workers (RHWs) and rural medical work. The significant association between continuing education and work commitment has been reported in many studies ...
Jinlin Liu, Ying Mao
doaj +1 more source
Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett+8 more
wiley +1 more source