Results 301 to 310 of about 2,285,782 (354)
Why expanding public health insurance coverage is not enough to provide effective ambulatory care: policy lessons from Mexico, 2000-2022. [PDF]
Martínez-Valle A.
europepmc +1 more source
Open science policy guidelines promoting open data sharing in low and middle-income countries for respiratory health research under NIHR Global RESPIRE project. [PDF]
Mohanty TK+5 more
europepmc +1 more source
Advancing food security and proposing future strategies: A comparative performance analysis of Global Food Security Index and Annual Population Changes of top five populous countries. [PDF]
Guo X, Islam M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security Policies for Databases
IFAC Proceedings Volumes, 1992Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
A. M. Tjoa, Günther Pernul
openaire +2 more sources
2011
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric+1 more
openaire +4 more sources
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric+1 more
openaire +4 more sources
Security Policies and Security Models
1982 IEEE Symposium on Security and Privacy, 1982We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Joseph A. Goguen, José Meseguer
openaire +2 more sources
2017
This chapter examines what the international literature tells us about French security and defense policy, but also what the French case teaches us about this literature. French scholarship on security and defense policy has demonstrated three main trends: the legacy of Charles de Gaulle’s vision and policies, a strongly policy-oriented production, and
Irondelle, Bastien+2 more
openaire +3 more sources
This chapter examines what the international literature tells us about French security and defense policy, but also what the French case teaches us about this literature. French scholarship on security and defense policy has demonstrated three main trends: the legacy of Charles de Gaulle’s vision and policies, a strongly policy-oriented production, and
Irondelle, Bastien+2 more
openaire +3 more sources