Filters








36,360 Hits in 2.9 sec

Stratified Abstraction of Access Control Policies [chapter]

John Backes, Ulises Berrueco, Tyler Bray, Daniel Brim, Byron Cook, Andrew Gacek, Ranjit Jhala, Kasper Luckow, Sean McLaughlin, Madhav Menon, Daniel Peebles, Ujjwal Pugalia (+6 others)
2020 Lecture Notes in Computer Science  
We present stratified predicate abstraction, a new approach that summarizes complex security policies into a compact set of positive and declarative statements that precisely state who has access to a  ...  We have implemented stratified abstraction and deployed it as the engine powering AWS's IAM Access Analyzer service, and hence, demonstrate how formal methods and SMT can be used for security policy explanation  ...  To this end, we introduce a new algorithm for computing stratified abstractions of policies, yielding a set of findings that are sound, i.e. which include all possible requests that can be granted access  ... 
doi:10.1007/978-3-030-53288-8_9 fatcat:qkbunkwznjewvawjkh2zn4dr7u

FlexFlow: A Flexible Flow Control Policy Specification Framework [chapter]

Shiping Chen, Duminda Wijesekera, Sushil Jajodia
2004 IFIP International Federation for Information Processing  
Flow control policy, Data flow, Security policy 1.  ...  Being designed to capture properties common across flows, FlexFlow is formulated using abstractions of nodes and trees of flows among them. Because of this abstractness, FlexFlow has two advantages.  ...  Our work has been influenced by the Flexible Authorization Framework (FAF) of Jajodia et al. [9]. FAF is proposed for specification of access control policies, but not flow control policies.  ... 
doi:10.1007/1-4020-8070-0_26 fatcat:vauozdjc7rai5l7kdwefnqaqyy

1713Interventions to Increase Healthcare Worker Influenza Vaccination: a meta-analysis

Reed Siemieniuk, Brenda Coleman, Shumona Shafiz, Ahmed Al-Den, Stephen Bornsten, Robert Kean, Allison Mcgeer, Laura Goodliffe
2014 Open Forum Infectious Diseases  
However, only condition of service policies appear to result in sustained HCW vaccination rates of >95%.  ...  Results: 9193 titles/abstracts were reviewed, and 121 were included (Fig 1) . Of 174 comparisons, 78 were low risk of bias (RoB), 30 were moderate RoB, and 66 were high RoB.  ...  Controlled Trials (CENTRAL), CINAHL, EMBASE, MEDLINE, Web of Science, and SCOPUS), as were bibliographies of included studies.  ... 
doi:10.1093/ofid/ofu052.1259 fatcat:m64zlwgd3jbmrij5inlwkun5fa

Recent Advances in Access Control Models [chapter]

Sushil Jajodia, Duminda Wijesekera
2002 Database and Application Security XV  
This paper discusses several access control models that have been recently proposed to address these emerging needs including models that provide policy-neutral flexible access control and their efficient  ...  Advances in application areas bring new dimensions to access control needs.  ...  NEED FOR FLEXIBLE ACCESS CONTROL MODELS Large numbers of access control models proposed over the years [Dobson and McDermid, 1989] have been developed with a number of pre-defined policies in mind and  ... 
doi:10.1007/978-0-387-35587-0_1 fatcat:n5pfsdcm5zggjogelntkqxdkuu

Attending Nurse Practitioners in Long-Term Care Homes Evaluation

Danielle Fearon, Refik Saskin, Lisa Ishiguro, Erin Graves
2018 International Journal of Population Data Science  
ResultsFor part one of this evaluation, case and control LTC homes were stratified by bed size, Case Mix Index, rurality and Local Health Integration Network.  ...  In summary, the results will inform policies to strengthen care of LTC homes and improve the quality of care of residents.  ...  Results For part one of this evaluation, case and control LTC homes were stratified by bed size, Case Mix Index, rurality and Local Health Integration Network.  ... 
doi:10.23889/ijpds.v3i4.965 fatcat:ird7u4qygnfhbciiubgcvefp2y

Recent Advances in Access Control Models [chapter]

Sushil Jajodia
2003 Lecture Notes in Computer Science  
This paper discusses several access control models that have been recently proposed to address these emerging needs including models that provide policy-neutral flexible access control and their efficient  ...  Advances in application areas bring new dimensions to access control needs.  ...  ., 2000 ] develop a comprehensive framework for composing access control policies, where an access control policy is a set of ground terms over an alphabet for (subject, object, action) terms.  ... 
doi:10.1007/978-3-540-45160-0_1 fatcat:t2shtdvjzzavlcwwqnpnyca3i4

Association Between Graphic Health Warning Labels on Cigarette Packs and Smoking Cessation Attempts in Korean Adolescent Smokers: A Cross-Sectional Study

Hye Jin Joo, Jae Hong Joo, Seung Hoon Kim, Eun-Cheol Park, Sung-In Jang
2022 Frontiers in Public Health  
We suggest that the use of graphic health warning labels is an effective policy-related intervention to reduce smoking in South Korean adolescents.  ...  Our findings indicate that graphic health warning labels on cigarette packs have the potential to lower smoking intentions of adolescents.  ...  Responses to tobacco control policies among youth. Tob Control. (2002) 11:14–9. doi: 10.1136/tc.11.1.14 PubMed Abstract | CrossRef Full Text | Google Scholar 11. Hawkins SS, Bach N, Baum CF.  ... 
doi:10.3389/fpubh.2022.789707 pmid:35223730 pmcid:PMC8873167 fatcat:zcrbc6jemfdidjupfn5iwclv6i

Effectiveness of ART and Condom Use for Prevention of Sexual HIV Transmission in Serodiscordant Couples: A Systematic Review and Meta-Analysis

Huixin Liu, Yingying Su, Lin Zhu, Jiannan Xing, Jing Wu, Ning Wang, D. William Cameron
2014 PLoS ONE  
We also estimated the prevention effectiveness of ART stratified by condom use level and the prevention effectiveness of consistent condom use stratified by ART use level.  ...  The IRR comparing seroconversion in couples where the index-partner was on ART versus not on ART was 0.47 (95%CI: 0.43, 0.52), while stratified by condom use, the IRR was 0.33(0.17,0.64).  ...  Acknowledgments The authors would like to thank M Kumi Smith from the University of North Carolina, Chapel Hill for her feedback and comments on earlier versions of this report.  ... 
doi:10.1371/journal.pone.0111175 pmid:25369471 pmcid:PMC4219707 fatcat:unrz633b4jfyfjfddy7zcxvz7q

Access control policies and languages

Sabrina De Capitani Di Vimercati, Sara Foresti, Pierangela Samarati, Sushil Jajodia
2007 International Journal of Computational Science and Engineering (IJCSE)  
In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.  ...  Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied.  ...  An access control model provides a formal representation of the access control security policy and its working.  ... 
doi:10.1504/ijcse.2007.015739 fatcat:iqvlyisfonfqbodkif7av7uftu

Protocol for a systematic review on inequalities in postnatal care services utilization in low- and middle-income countries

Étienne V Langlois, Malgorzata Miszkurka, Daniela Ziegler, Igor Karp, Maria Victoria Zunzunegui
2013 Systematic Reviews  
Discussion: Our review will inform policy-making with the aim of decreasing inequalities in utilization of PNC services.  ...  Results will be stratified by countries' income levels (World Bank classification).  ...  Diane St-Aubin, Senior Librarian at the Documentation Center of the University of Montreal Hospital Centre (CHUM) for critical review of our search strategy, along with Mr.  ... 
doi:10.1186/2046-4053-2-55 pmid:23830501 pmcid:PMC3717005 fatcat:rquj7roxn5djxlyekz4mw5zfym

Heuristics for Safety and Security Constraints

Flemming Nielson, Hanne Riis Nielson
2007 Electronical Notes in Theoretical Computer Science  
We illustrate it on the Bell-LaPadula mandatory access control policy where the heuristics is used to suggest modifications to the security annotations of entities in order for the security policy to hold  ...  The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-free least fixed point logic  ...  The main motivating example for this development is from the world of mandatory access control policies.  ... 
doi:10.1016/j.entcs.2007.02.018 fatcat:nfrp6jzrirbrtie4jmcvw6rdd4

Page 4357 of Psychological Abstracts Vol. 84, Issue 9 [page]

1997 Psychological Abstracts  
—This study used a stratified sample to elicit information about policies and practices for managing detainees with mental illnesses in 5 sizes of jails.  ...  over the age of 60 yrs who access these services is relatively low.  ... 

Pandemics, epidemics and inequities in routine childhood vaccination coverage: a rapid review

Nick Spencer, Rita Nathawad, Emmanuele Arpin, Samantha Johnson
2020 BMJ Paediatrics Open  
COVID-19 control measures have resulted in coverage reductions. We conducted a rapid review of the impact of pandemics on existing inequities in routine vaccination coverage.  ...  The review demonstrates a gap in the literature as none of the 29 papers selected for full-paper review from 1973 abstracts identified from searches met the inclusion criteria.  ...  Research, using international data and including equity stratifiers, is needed to inform policy so that advances in vaccination coverage equity are not reversed.  ... 
doi:10.1136/bmjpo-2020-000842 pmid:33195821 pmcid:PMC7607602 fatcat:souj6vp36fbsbc5dyez5lje4d4

Effect of Expansions in State Medicaid Eligibility on Access to Care and the Use of Emergency Department Services for Adult Medicaid Enrollees

Chima D. Ndumele, Vincent Mor, Susan Allen, James F. Burgess, Amal N. Trivedi
2014 JAMA Internal Medicine  
2008 , and 2012), we used the time points nearest to the policy implementation to assess changes in provider reimbursement. 17, 18 Individual-level covariates were abstracted.  ...  Stratified and Sensitivity Analyses In stratified analyses by age, sex, race/ethnicity, selfreported health status, and history of chronic disease, we observed a consistent noneffect of Medicaid expansions  ...  Conflict of Interest  ... 
doi:10.1001/jamainternmed.2014.588 pmid:24710866 pmcid:PMC5567677 fatcat:ktyri3ircjgdnpv4e7depcjrny

Policies, Models, and Languages for Access Control [chapter]

Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia
2005 Lecture Notes in Computer Science  
In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.  ...  Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied.  ...  An access control model provides a formal representation of the access control security policy and its working.  ... 
doi:10.1007/978-3-540-31970-2_18 fatcat:ebrdrkzrzrdxzgqkwwoqyor6uy
« Previous Showing results 1 — 15 out of 36,360 results