• No results found

enhanced access

The Economic Impact of Enhanced Access to Research Findings

The Economic Impact of Enhanced Access to Research Findings

... and enhanced access to the information underpinning policy ...greater access for small and medium sized firms (SMEs), enabling SMEs to do more research internally, increasing the share of R&D ...

31

Exploiting Cryptography for Privacy-Enhanced Access Control

Exploiting Cryptography for Privacy-Enhanced Access Control

... an access decision in the absence of certified ...privacy-enhanced access control system that includes dif- ferent models and ...regulate access to resources and, on the other side, to protect ...

34

A framework for privacy-enhanced access control analysis in requirements engineering

A framework for privacy-enhanced access control analysis in requirements engineering

... an access control ...supporting access control ...and access control policies expressed in Ponder ...requirements-level access control analysis for security policy ...

9

Semantic Security for e-health: A Case Study in Enhanced Access Control

Semantic Security for e-health: A Case Study in Enhanced Access Control

... data access can be given the right “security behavior”,Rossilawati et ...based access control (WBAC) has been proposed to refine the resource instances and adapt access rights bound to the workflow ...

8

Privacy Enhanced Access Control for Outsourced Data Sharing

Privacy Enhanced Access Control for Outsourced Data Sharing

... retrieving access tokens requires reading the coarse-level tree with access tokens for the data of a particular ...to access. However, once retrieved the access credentials for all files can ...

15

The Enhanced Access Control Scheme for Implantable Medical Devices
Perla Krishnakanth

The Enhanced Access Control Scheme for Implantable Medical Devices Perla Krishnakanth

... can access the ...the access control schemes to prevent unauthorized ...IMD access control schemes based on architecture, type of keys used, access control channel and ...different ...

5

Exploring Determinants of Housing Prices in Beijing: An Enhanced Hedonic Regression With Open Access POI Data

Exploring Determinants of Housing Prices in Beijing: An Enhanced Hedonic Regression With Open Access POI Data

... The use of the hedonic pricing model has a long tradition in urban studies. In this study, we have developed a complete housing and amenity POI database via web-crawling and employing an open access API. We also ...

14

MILITARY PERSONNEL. Visibility over Junior Enlisted Servicemember Access to Services on Bases Could Be Enhanced

MILITARY PERSONNEL. Visibility over Junior Enlisted Servicemember Access to Services on Bases Could Be Enhanced

... comments for tone, determining whether each comment about a particular service or program was positive, negative, or neutral. One analyst coded each response into 1 of the 13 categories, and another analyst reviewed the ...

59

Community Pharmacy Enhanced Dispensing Model to Improve Medication Access for Rural Patients Living with HIV

Community Pharmacy Enhanced Dispensing Model to Improve Medication Access for Rural Patients Living with HIV

... Identified barriers to adherence with this service typically revolve around communication. Patients in this particular service’s population are difficult to reach and most do not answer phone calls. Patients often change ...

8

Network Access (Local Loop) Port Committed Access Rate (CAR) (Required only when ordering an enhanced Class of Service) Installation:

Network Access (Local Loop) Port Committed Access Rate (CAR) (Required only when ordering an enhanced Class of Service) Installation:

... Verizon Unified Communications as a Service (UCaaS) provides a hosted VOIP service based on a Cisco infrastructure, bundled into a single per user cost. Pricing is based on the type of package that is chosen (described ...

28

Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802  15  6

Enhanced CSMA/CA Contention Window for Efficient Random Access in IEEE 802 15 6

... and MAC for short range, low cost and complexity but also ultra-low power and high reliable wireless communication .The IEEE 802.15.6 draft operates with one-hop star and and multi-hop topologies. In the one-hop ...

6

SANGFOR INTERNET ACCESS MANAGEMENT. Increased Visibility. Enhanced Management. Value-Added Marketing.

SANGFOR INTERNET ACCESS MANAGEMENT. Increased Visibility. Enhanced Management. Value-Added Marketing.

... IT departments are often neglected as they are only seen as a cost, rather than an investment. Improving user experience and work efficiency , blocking illegal endpoints, reducing bandwidth consumption, guarding ...

8

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

... for access control in poset ordered hierarchies based on one-way secure hash functions [21], the discrete logarithm problems [11, 18, 22], the factoring problems [12, 23, 24] and the Newton’s interpolating poly- ...

12

Closing the Gap: Improving Access to Mental Health Care Through Enhanced Training in Residency

Closing the Gap: Improving Access to Mental Health Care Through Enhanced Training in Residency

... 1, 2, 11, 13 Such training will empower pediatricians to manage treatments for common mental health conditions in primary care settings while also ensuring mental health subspec[r] ...

5

An Enhanced Service Flow Management Scheme for IEEE 802.16 Broadband Wireless Access Systems

An Enhanced Service Flow Management Scheme for IEEE 802.16 Broadband Wireless Access Systems

... transport layers and the physical layer. It picks out MAC service data units (MSDUs) packets from the upper layer and forms them into MAC protocol data units (MPDUs) for sent transmission and likewise for received ...

5

ENHANCED SERVICE DELIVERY REACH AND ACCESS

ENHANCED SERVICE DELIVERY REACH AND ACCESS

... final examinations. A longer-term benefit would thus be better prepared first-year students at tertiary level, who may have a better chance of success in courses where mathematics is a compulsory subject. Tutors have ...

7

The experiences of newcomer populations and access to higher education opportunities in Ireland : an exemplar of enhanced or impeded integration policy

The experiences of newcomer populations and access to higher education opportunities in Ireland : an exemplar of enhanced or impeded integration policy

... Migrants have expressed concern over the lack of qualification recognition, leading them to disregard their hard earned previous education qualifications and repeat or start again. Moreover, migrants either are unaware ...

394

Trust Enhanced Secure Cloud Data Storage Using Cryptographic Role-Based Access Control Mechanism

Trust Enhanced Secure Cloud Data Storage Using Cryptographic Role-Based Access Control Mechanism

... to access the document from this share point at any ...to access documents. The documents access by through remote devices and remote accessing the system will be consider as this security setting ...

7

Multilayer security enhanced channel pre authentication and data access 
		using Hadamard Pattern in wireless personal area networks

Multilayer security enhanced channel pre authentication and data access using Hadamard Pattern in wireless personal area networks

... Security experts have analyzed and carried out research in the security architecture of Bluetooth. Major commendable research work is referred in [6] and [8]. Different techniques used for device pairing in wireless ...

17

Access Using Access

Access Using Access

... Access provides the facility to undo the last change made to the data. The command may vary according to the change just made e.g. Undo Typing, Undo Current Field, Undo Current Record, Undo Saved Record. Note that ...

34

Show all 10000 documents...

Related subjects