Filters








7,777,700 Hits in 8.6 sec

On an authorization mechanism

Ronald Fagin
1978 ACM Transactions on Database Systems  
We prove correctness (in a certain strong sense) for our modified authorization mechanism.  ...  Database Syst. 1, 3, (Sept. 1976), 242-255) have defined a dynamic authorization mechanism that goes beyond the traditional password approach.  ...  ACKNOWLEDGMENTS The author is grateful to Pat Griffiths and Brad Wade for helpful discussions and suggestions, and to Peter Denning for a historical perspective.  ... 
doi:10.1145/320263.320288 fatcat:hmvnompyoncsvg4wldw6cncpem

An authorization mechanism for a relational database system

Patricia P. Griffiths, Bradford W. Wade
1976 ACM Transactions on Database Systems  
ACKNOWLEDGMENTS The authors thank Donald D.  ...  Chamberlin and Jim Gray of the IBM San Jose Research Laboratory, and David Redell of Project MAC, for many fruitful discussions on the subject of protection and privacy.  ...  For example, consider the sequenceA: GRANT READ, INSERT, UPDATE ON EMPLOYEE TO X B: GRANT READ, UPDATE ON EMPLOYEE TO X A: REVOKE INSERT, UPDATE ON EMPLOYEE FROM X An Authorization Mechanism for a Relational  ... 
doi:10.1145/320473.320482 fatcat:avqee4kjurcofp4haheqeqfg7a

An authorization mechanism for a relational data base system

P. P. Griffiths, B. W. Wade
1976 Proceedings of the 1976 ACM SIGMOD international conference on Management of data - SIGMOD '76  
ACKNOWLEDGMENTS The authors thank Donald D.  ...  Chamberlin and Jim Gray of the IBM San Jose Research Laboratory, and David Redell of Project MAC, for many fruitful discussions on the subject of protection and privacy.  ...  For example, consider the sequenceA: GRANT READ, INSERT, UPDATE ON EMPLOYEE TO X B: GRANT READ, UPDATE ON EMPLOYEE TO X A: REVOKE INSERT, UPDATE ON EMPLOYEE FROM X An Authorization Mechanism for a Relational  ... 
doi:10.1145/509383.509393 dblp:conf/sigmod/GriffithsW76 fatcat:rp3ilfcgpnhydn6balhduhhso4

An authorization mechanism for a relational data base system

P. P. Griffiths, B. W. Wade
1976 Proceedings of the 1976 ACM SIGMOD international conference on Management of data - SIGMOD '76  
ACKNOWLEDGMENTS The authors thank Donald D.  ...  Chamberlin and Jim Gray of the IBM San Jose Research Laboratory, and David Redell of Project MAC, for many fruitful discussions on the subject of protection and privacy.  ...  For example, consider the sequenceA: GRANT READ, INSERT, UPDATE ON EMPLOYEE TO X B: GRANT READ, UPDATE ON EMPLOYEE TO X A: REVOKE INSERT, UPDATE ON EMPLOYEE FROM X An Authorization Mechanism for a Relational  ... 
doi:10.1145/509389.509393 fatcat:3ml3jsqipfb7tgcm2rjpjlxxga

The Mechanism of Perception of an Antique Text by a Medieval Author (Based on Macrobius and P. Abelard's Texts)
МЕХАНИЗМ ВОСПРИЯТИЯ АНТИЧНОГО ТЕКСТА СРЕДНЕВЕКОВЫМ АВТОРОМ (на примере сочинений Макробия и П. Абеляра)

M.S. Petrova, Institute of World History, Russian Academy of Sciences, Moscow, 119334 Russia
2021 Učënye Zapiski Kazanskogo Universiteta: Seriâ Gumanitarnye Nauki  
The texts of Peter Abelard (1079 1142), usually mentioned among the medieval authors who were influenced by Ambrosius Theodosius Macrobius' "Commentary on the 'Dream of Scipio'" (5th c.), are analyzed.  ...  of Scipio'" on Peter Abelard.  ... 
doi:10.26907/2541-7738.2021.3.164-174 fatcat:vwpmjuolq5hcvf3dggf3ngfsuq

Art. XVII. Treatise on the Radical Cure of Hernia by instruments, embracing an analysis of the mechanical properties of the various trusses now in use, a description of the new instruments invented by the author, and general directions to patients for the safe employment of these instruments, with hints to surgeons in their application, &c. with numerous illustrations

HEBER CHASE
1836 American Journal of the Medical Sciences  
On more than one point we_ certainly differ from the opinions advanced by the author bu those are neither so important nor prominent as tn imp,!  ...  na"on. i^I}hnseal'3ei0nt-,'e,Ilat>iCalCure °fHernia bvinstruments,embracing an £ T£ tm'fZmCa ifTrlies fthe mrious trusses now in use, a dJriprvi";.  ... 
doi:10.1097/00000441-183618370-00017 fatcat:wut7oj3jpbekdpj7klttazqwhe

An Evaluation of the Impacts of Authority Coordinating Mechanism on Innovation Ability in Innovation Cluster

Jie Zhen
2015 Proceedings of the 2015 International Conference on Management Science and Management Innovation   unpublished
On the background of the inter-enterprise knowledge sharing, this paper elucidates the connotation and characters of the nonbusiness authority coordinating mechanism and the dimentions of cooperative innovation  ...  Then the paper reveals the effect mechanism of the authority coordinating mechanism affecting the cooperative innovation performance with cooperative innovation capability as medium.  ...  Therefore, this article makes the theoretical investigation and empirical analysis on the internal mechanism of authority coordinating mechanism.  ... 
doi:10.2991/msmi-15.2015.72 fatcat:wnenlb2gubh2bmyrvjlnf73fru

A survey on various mobile malware attacks and security characteristics The increase of the smart devices is quickly expanding and is progressively turning out to be more modern device in the recent smart world. This expanding prominence is making the attackers have a flawless focus on it. The smart devices prepared with the advanced complicated software and hardware systems are paying way for the profit of the malware attackers. The malware authors targets the mobile devices and destruct the information in ...

2017 International Journal of Latest Trends in Engineering and Technology  
Based on the Linux system, the security mechanism for Google Android was developed.  ...  MOBILE MALWARE The malware works with two words software and the malicious that shows plainly that the programs Categories of Mobile Attacks Unauthorized access performed by the malware authors on  ... 
doi:10.21172/1.82.060 fatcat:c47qwv4lrrcqtestovkssi2cga

Journal Vol – 13 No -4, October 2018 Journal > Journal Vol – 13 No -4, October 2018 Approximate Solution of Strongly Forced Nonlinear Vibrating Systems Which Vary With Time admin October 24, 2018 Based on the combined work of extended Krylov-Bogoliubov-Mitropolskii method and harmonic balance (HB) method an analytical technique is presented to determine approximate solutions of nonlinear differential systems whose coefficients change slowly and periodically with time. Furthermore, a non-autonomous case also ...

Sk Azharuddin
2018 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
Trap One Recombination (OTOR) model and Interactive Multi Trap System (IMTS) model.  ...  present paper we have adjudged the suitability of widely used Peak Shape method for determination of activation energy by considering computer generated thermoluminescence (TL) peaks obtained by using One  ...  These models are known as One Trap One Recombination (OTOR) model and Interactive Multi Trap System (IMTS) model [IX], [X].  ... 
doi:10.26782/jmcms.2018.10.00003 fatcat:xicv6ewmbbantivcpztqx27hcq

Title Author Hits Investigating the Effects of Cognitive Style Diversity on the Hypothesis Generation and Troubleshooting Ability of Undergraduate Students Enrolled in an Introductory Agricultural Mechanics Course at Louisiana State University Written by Whitney L. Figland, J. Joey Blackburn, Kristin S. Stair, and Michael F. Burnet Hits: 268 Exploring Curriculum Congruence and Connectivity within School-Based Agricultural Education Written by Eric M. Moser and Aaron J. McKim Hits: 343 An Application of Soci ...

2021 Journal of Agricultural Education  
through hands-on application.  ...  However, limited research has been conducted on how agriculture teachers are using the curriculum after completing the required professional development training and its impact on their future classroom  ...  An example of this would be a lab where students test the "5-second rule" of dropping food on the ground to observe what bacteria colonies might grow.  ... 
doi:10.5032/jae.2021.01260 fatcat:ipsgnxlfc5et3dg7gpv2ufx4oq

Journal Vol – 15 No -7, July 2020 Journal > Journal > Journal Vol – 15 No -7, July 2020 > Page 6 PERFORMANCE AND EMISSION CHARACTERISTICS OF GASOLINE-ETHANOL BLENDS ON PFI-SI ENGINE Authors: D.Vinay Kumar ,G.Samhita Priyadarsini,V.Jagadeesh Babu,Y.Sai Varun Teja, DOI NO: https://doi.org/10.26782/jmcms.2020.07.00051 admin July 26, 2020 Abstract: Alcohol based fuels can be produced from renewable energy sources and has the potential to reduce pollutant emissions due to their oxygenated nature. Lighter alcohol ...

Farooq Sk
2020 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
On the other hand methanol can be obtained from different bio-resources and has the potential to be used in engines.  ...  Ethanol can be used as an alternate fuel in internal combustion engines. But extensive usage of ethanol is restricted because of its biomass limit.  ...  [VI] conducted experiments on a multi cylinder four-stroke SI engine for fuel blends of E0, E5, E10, E15 respectively and reported an increase in engine performance parameters such as torque , bake thermal  ... 
doi:10.26782/jmcms.2020.07.00056 fatcat:g7apozj6dfg2li45br43ekcsp4

(2021) Volume 2, Issue 4 Cultural Implications of China Pakistan Economic Corridor (CPEC Authors: Dr. Unsa Jamshed Amar Jahangir Anbrin Khawaja Abstract: This study is an attempt to highlight the cultural implication of CPEC on Pak-China relations, how it will align two nations culturally, and what steps were taken by the governments of two states to bring the people closer. After the establishment of diplomatic relations between Pakistan and China, the cultural aspect of relations between the two states al ...

2021 Journal of Development and Social Sciences  
Constitutional institutions such as Council of Common Interest, Indus River System Authority (IRSA), Water and Power Development Authority (WAPDA), provincial irrigation departments, and provincial irrigation  ...  Karachi produces an estimated 1.8 million cubic meters of sewage every day (KWSB, 2018) .  ... 
doi:10.47205/jdss.2021(2-iv)74 fatcat:o63evbbvmfghhfbrzetuczvedq

COMMON MODELS FOR CONFIGURATION MANAGEMENT AND AUTHORIZATION MANAGEMENT IN SYSTEMS ENGINEERING ENVIRONMENTS

Biju Kalathil, John Welsh, Mary Catherine Tuck, Mark Bailey, Auti Zielhke
1996 INCOSE International Symposium  
In an integrated product development environment that includes several vendor tools, diverse and incompatible configuration management mechanisms and authorization management mechanisms across tools can  ...  We specified a common minimal set of configuration management mechanisms and authorization management mechanisms that must be provided by the tools to support the proposed configuration and authorization  ...  In a message access rule, an authorization object is an object class on which an operation may be specified, an authorization role is a defined group or user for which the authorization is valid, and an  ... 
doi:10.1002/j.2334-5837.1996.tb02028.x fatcat:aczsjirhgbgppdrnyojww63qyy

Liquid authority and political legitimacy in transnational governance

Kate Macdonald, Terry Macdonald
2017 International Theory  
We then present an illustrative case study of the interaction between liquid authority and legitimizing mechanisms of public accountability and pragmatic experimentalism in the context of transnational  ...  We conclude by considering broader implications of our argument for both the design of legitimate transnational governance institutions, and future research agendas on transnational authority and legitimacy  ...  Adapting legitimizing mechanisms to liquid transnational authority structures Drawing on the preceding theoretical analysis, we can identify an analytic strategy for identifying and justifying institutional  ... 
doi:10.1017/s1752971916000300 fatcat:wtnivjwkl5gftmkidshbuhgdmq

Multilayer authorization model and analysis of authorization methods

Alper UĞUR, İbrahim SOĞUKPINAR
2016 Turkish Journal of Electrical Engineering and Computer Sciences  
An institutional authorization mechanism on documents is also proposed.  ...  The proposed mechanism suggests and implements an authorization mechanism to enclose authorization restrictions in institutional regulations.  ...  One of the layered authorization mechanisms in the literature is OAuth [17] , which is an authorization framework providing an authorization layer that limits the access of a third party to an HTTP service  ... 
doi:10.3906/elk-1403-200 fatcat:lpsgfz42afeblbfrclwogahqv4
« Previous Showing results 1 — 15 out of 7,777,700 results