Filters








321 Hits in 5.4 sec

Model-driven simulation for cross-domain policy enforcement

Zhengping Wu, Lifeng Wang
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
entity for the healthcare operations of the entity receiving the information, with valid authorization, if the covered entity has received the individual's oral agreement for the use of the PHI, and in  ...  To make sure the compatibility and enforceability of one policy set in another domain, a simulation environment is needed before actual policy deployment and code development.  ...  The semantic gap between policy languages and enforcement mechanisms also exists in Antigone system.  ... 
doi:10.4108/icst.trustcol.2010.5 dblp:conf/colcom/WuW10 fatcat:jyiiecdoafgdtdp4n4sfwq5u44

On context in authorization policy

Patrick McDaniel
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
This paper considers context requirements and services in authorization policy. The properties and security requirements of context evaluation are classified.  ...  Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well understood.  ...  Systems like Antigone [17] and the Generic Authorization and Accesscontrol API (GAA-API) [22] provide generic upcall interfaces to which condition implementations are built.  ... 
doi:10.1145/775412.775422 dblp:conf/sacmat/McDaniel03 fatcat:37pmst33pbfffjy62pd6b4cjbi

On context in authorization policy

Patrick McDaniel
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
This paper considers context requirements and services in authorization policy. The properties and security requirements of context evaluation are classified.  ...  Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well understood.  ...  Systems like Antigone [17] and the Generic Authorization and Accesscontrol API (GAA-API) [22] provide generic upcall interfaces to which condition implementations are built.  ... 
doi:10.1145/775418.775422 fatcat:mpgznr5yrratvh3x3g7m5heizy

Trust management for e-transactions

Vishwas Patil, R. K. Shyamasundar
2005 Sadhana (Bangalore)  
contract and policy are used interchangeably) without violating the privacy and confidentiality laws that prevail across geographical boundaries.  ...  But as the system becomes complex and dynamic, contractual incompleteness arises since it becomes cumbersome to mention potentially large set of outcomes of the user's choice of action.  ...  That is, REFEREE is a system for writing policies about policies, as well as policies about cryptographic keys, PICS label bureaus, certification authorities, trust delegation, etc. 2.2d Antigone: The  ... 
doi:10.1007/bf02706242 fatcat:lrtpl3qbfzgkxlmfiii7eju75i

O Guarda e a Fórmula

Carlos Eduardo Paletta Guedes, João Vitor De Freitas Moreira
2019 Revista Direito e Práxis  
Antigone relied solely on the moral system, the normative ancient rule. The Guard after the confession of his confusion acted in accordance with Creon's decree, deciding to follow the legal system.  ...  With that in mind, the moral rule that Antigone chooses to follow was also part of the legal system of Thebes, (which was developed in a minimum).  ... 
doi:10.1590/2179-8966/2019/35974 fatcat:43lihifn3zhnrhd6rzm557fone

Page 3 of Information Services Vol. 14, Issue 3 [page]

1935 Information Services  
The Realistic Foreign Policy of Japan.’ ’—Japan’s foreign policy must find its test in China.  ...  ., the Bible, Sophocles’ Antigone, Shake- speare’s works, and those of Milton, Shelley, Byron, Ruskin and Carlyle, are eminently practical in significant ways.  ... 

Classical Literature Gives Life to Business Paradox and Systems Integration

Robert Page, Samuel Andoh, Robert Smith
2017 Administrative Issues Journal Education Practice and Research  
Grounding these concepts in the Classics embeds them in great stories of passion, betrayal, commitment, and emotion normally absent in business courses.  ...  Business textbooks and cases are usually sanitized, simplified, and quantified, stripping them of the chaos normally experienced in reality.  ...  Creon is angry, and quickly discovers Antigone buried her brother. However, when Antigone refuses to apologize, Creon feels trapped with no alternative but to enforce policy and execute his niece.  ... 
doi:10.5929/2017.7.2.5 fatcat:frzmx2xm4bdrzmpraorzbbeyxq

TOWARD A MINOR THEATRE: MYRIAM BEN'S ALGERIAN ANTIGONE

Kelley, Caroline
2011 452ºF  
In this paper, I read Myriam Ben's Leïla, poème scénique en deux actes et un prologueas a reinterpretation of Sophocles' Antigone.  ...  of the liberation struggle, the Front de Libération Nationale (FLN) and, especially, the military overthrow of President Ahmed Ben Bella by his Defence Minister Houari Boumediene in 1965.  ...  The transferral of devotion from a brother to a sister-in-arms rejects a blind loyalty to patriarchal kinship systems established in the Antigone.  ... 
doaj:6f26903c3e784567b47533e4222e3663 fatcat:lvchicblg5ccledjcqy4plzdli

"... And What About those who Disagree with the Measures Against the Pandemic?"

Fereniki Panagopoulou
2022 Biomedical Journal of Scientific & Technical Research  
Mask and vaccine deniers are not in agreement with a certain legislative provision, which is based on research data.  ...  For the above to become more intelligible, the following conclusions may be drawn: a) The position "I consider the use of the mask and the enforcement of vaccination in public places problematic: people  ... 
doi:10.26717/bjstr.2022.41.006536 fatcat:ayvo6dca4bbk5bohqnkxv7jghe

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing

Prashant A. Kadam, Avinash S. Devare
2014 International Journal of Computer Applications Technology and Research  
It provides fine grained access control of data by showing only the requested and authorized details to the user thus improving the performance of the system.  ...  The proposed scheme achieves scalability by handling the authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case of  ...  within the Antigone.  ... 
doi:10.7753/ijcatr0312.1010 fatcat:jareujngv5fmjgudx4y34sauhy

Counterterrorism measures as a migration control device

Eleonora Celoria, Fachinformationsdienst Für Internationale Und Interdisziplinäre Rechtsforschung
2021 Verfassungsblog: On Matters Constitutional  
In fact, the competence for the review of deportation orders belongs to honorary judges, who can barely be considered independent and rarely question the assumptions made by police authorities (see Antigone  ...  However, links between migration control and counterterrorism measures do exist in the Italian migration management system.  ... 
doi:10.17176/20211107-131157-0 fatcat:iutgydnwkfcodczfxq6ofbgb7m

Human Rights, the Rule of Law and Democracy: Recent Experience of Hong Kong and China

Johannes M M Chan
2015 Social Science Research Network  
The previous legal, social, and capitalist economic system is preserved and socialist policies do not apply to Hong Kong. The common law system is preserved.  ...  The sovereign state 36 PRC 37 " 3637 White Paper on The Practice of the One Country, Two Systems Policy in the HKSAR (2014), at para 3.  ... 
doi:10.2139/ssrn.2641332 fatcat:akmqg6tuw5cgzidibymplea5ru

The Use of Surveillance Technologies for the Prevention, Investigation and Prosecution of Serious Crime

Celine Cocq, Francesca Galli
2015 Social Science Research Network  
The SURVEILLE methodology can assist legislators, policymakers, technology developers and end-users of surveillance technologies (such as the police or local authorities) in a process of rational, transparent  ...  In order better to reach academic audiences in Europe and beyond, the EUI Law Department decided to publish selected SURVEILLE research reports also in the form of Working Papers.  ...  Interference of the private sector in the criminal justice system Traditionally, the State and public authorities have a sort of monopoly on the law enforcement and criminal justice systems.  ... 
doi:10.2139/ssrn.2695091 fatcat:psosamc6drc65odyatggkfdmfe

From Paul Vladimiri to Gustavo Zagrebelsky. Constitutional justice in the age of hybrid warfare

Andrzej Kobyliński
2019 Studia Philosophiae Christianae  
Paul Vladimiri (1370-1435) was a distinguished Polish scholar and jurist who defended the rights of Poland and native non-Christian tribes against the Teutonic Knights and their policies of conquest.  ...  between states in the age of hybrid wars.  ...  non-Christian tribes against the Teutonic Knights and their policies of conquest.  ... 
doi:10.21697/2017.53.3.05 fatcat:d5pgerttkvbupbn7cyl3nlqjnq

Antigone 904-920 and the Institution of Marriage

Sheila Murnaghan
1986 American Journal of Philology  
Lines 904-20 of Sophocles' Antigone form one of the most vexed and controversial passages in classical literature.'  ...  passage is quoted without reservation by the most authoritative ancient critic of tragedy, Aristotle, who refers to it in the Rhetoric  ...  The Antigone dramatizes the consequences of rifts between entities that ought ideally to overlap and support each other: the family and the city, political policies and religious traditions.  ... 
doi:10.2307/294602 fatcat:c2ofsieewjgxbcvwz3ksy4a6ve
« Previous Showing results 1 — 15 out of 321 results