Results 61 to 70 of about 1,971,716 (147)

Targeted killing as a means of asymmetric warfare: a provocative view and invitation to debate [PDF]

open access: yes, 2011
The killing of Mahmoud al-Mabhou reportedly by agents of Israel‟s Mossad service in Dubai a year ago1 serves as a quick reminder that extrajudicial executions, assassinations and other targeted killing operations are taking place and are part of a modern
Bachmann, Sascha-Dominik, Haeussler, Ulf
core  

C-FLAT: Control-FLow ATtestation for Embedded Systems Software

open access: yes, 2016
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover).
Abera, Tigist   +7 more
core  

Legal Archetypes and Metadata Collection [PDF]

open access: yes, 2017
In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than ...
Rubel, Alan
core  

Legislative Malpractice: Misdiagnosing Patients' Rights [PDF]

open access: yes, 2000
The recent debate in Congress over patients' rights and the regulation of managed care has been predicated largely on a misunderstanding of the Employee Retirement Income Security Act of 1974.
Greg Scandlen
core  

Workplace arterial hypertension: potential of rilmenidine-based combination therapy

open access: yesКардиоваскулярная терапия и профилактика, 1970
Aim. To assess effectiveness and tolerability of morning / evening-administered rilmenidine in patients with work-place arterial hypertension (WpAH), during combination therapy. Material and methods.
S. I. Drozdetsky   +2 more
doaj  

Corporate social responsibility in the first years of Caja de Pensiones para la Vejez y de Ahorros [PDF]

open access: yes
When Caja de Pensiones para la Vejez y de Ahorros, 'la Caixa', was created in 1905, it was not just a transient response to a serious social, political, and economic problem; it also provided a permanent solution by creating a long-lasting social welfare
Argandoña, Antonio   +2 more
core  

Orchestration under Security Constraints [PDF]

open access: yes, 2010
International audienceAutomatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services.
Chevalier, Yannick   +2 more
core   +1 more source

Study on the Mechanism Effect of Bending Loads on the Decay-like Degradation of Composite Insulator GFRP Core Rod

open access: yesEnergies
This paper investigates the deterioration of, and the abnormal temperature rise in, the GFRP core rod material of compact V-string composite insulators subjected to prolonged alternating flexural loading under wind-induced stresses.
Xiaoyu Yi   +8 more
doaj   +1 more source

THE CORRELATION OF THE CONCEPTS “NATIONAL SECURITY” AND “STATE SECURITY” IN LAW. THE PLACE OF THE FEDERAL SECURITY SERVICE OF RUSSIA IN ENSURING STATE SECURITY

open access: yesПравовое государство: теория и практика
The analysis of the legal basis of the activities of the bodies of the Federal Security Service of the Russian Federation (hereinafter – the FSB of Russia), in particular the security objects in their view, requires a clear understanding of each key
YUSUPOV Rakhimian Galimianovich   +1 more
doaj   +1 more source

Beginning of the State Security Operations against Exarch Stefan during the 40s of the 20th Century

open access: yesForum Theologicum Sardicense
Dilyan Nikoltshev, Beginning of the State Security Operations against Exarch Stefan during the 40s of the 20th Century. The life of the third Bulgarian Exarch, Stefan, has been the subject of numerous studies.
Dilyan Nikolchev
doaj   +1 more source

Home - About - Disclaimer - Privacy