Results 21 to 30 of about 191,712 (313)

Adaptive Security Policies [PDF]

open access: yes, 2020
We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be assured, that it will not be able to observe any violation of its own security policy due to the changing presence of other agents in its ...
Nielson, Flemming   +2 more
openaire   +3 more sources

Enforceable security policies [PDF]

open access: yesACM Transactions on Information and System Security, 2000
A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed.
openaire   +4 more sources

Games for groundwater governance: field experiments in Andhra Pradesh, India

open access: yesEcology and Society, 2016
Groundwater is a common-pool resource that is subject to depletion in many places around the world as a result of increased use of irrigation and water-demanding cash crops. Where state capacity to control groundwater use is limited, collective action is
Ruth Meinzen-Dick   +6 more
doaj   +1 more source

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario

open access: yesInternational Journal of Nuclear Security, 2016
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities.
Mohammad A. Hawila, Sunil S. Chirayath
doaj   +1 more source

Driver Profile and Driving Pattern Recognition for Road Safety Assessment: Main Challenges and Future Directions

open access: yesIEEE Open Journal of Intelligent Transportation Systems, 2023
This study reviews the Artificial Intelligence and Machine Learning approaches developed thus far for driver profile and driving pattern recognition, representing a set of macroscopic and microscopic behaviors respectively, to enhance the understanding ...
Dimitrios I. Tselentis   +1 more
doaj   +1 more source

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies

open access: yesProceedings 2020 Network and Distributed System Security Symposium, 2020
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP deployment has evolved for a set of 10,000 highly ranked domains.
Roth, S   +4 more
openaire   +3 more sources

Combining Approaches for Systemic Behaviour Change in Groundwater Governance

open access: yesInternational Journal of the Commons
Over-extraction of groundwater is a prominent challenge in India, with profound implication for food security, livelihoods, and economic development. As groundwater is an ‘invisible’ and mobile common pool resource, sustainable governance of groundwater ...
Richu Sanil   +3 more
doaj   +1 more source

The Hong Kong Pro-democracy Movement: Challenges and Divisions in the Past Decade [PDF]

open access: yesContemporary Chinese Political Economy and Strategic Relations: An International Journal, 2023
This article is an attempt to examine the challenges to Hong Kong’s pro-democracy movement and the movement’s internal divisions in the past decade or so.
Joseph Yu-shek Cheng
doaj  

Continuing medical education and work commitment among rural healthcare workers: a cross-sectional study in 11 western provinces in China

open access: yesBMJ Open, 2020
Objectives Continuing medical education (CME) and work commitment are important for rural healthcare workers (RHWs) and rural medical work. The significant association between continuing education and work commitment has been reported in many studies ...
Jinlin Liu, Ying Mao
doaj   +1 more source

Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy