Academic literature on the topic 'RBAC'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RBAC.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RBAC"

1

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Full text
Abstract:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operatio
APA, Harvard, Vancouver, ISO, and other styles
2

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Full text
Abstract:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumo
APA, Harvard, Vancouver, ISO, and other styles
3

Marquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.

Full text
Abstract:
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in mitigating insider threats to database security within various organizational environments. Insider threats represent a significant challenge for database security, necessitating robust and adaptive security measures. By delineating access based on users' roles within an organization, RBAC emerges as a critical tool against such threats. Employing a quantitative research methodology, this work gathered data through a survey targeting professionals directly involved in the security and management of organiz
APA, Harvard, Vancouver, ISO, and other styles
4

M Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.

Full text
Abstract:
Role-Based Access Control (RBAC) has become the main approach in improving data security in various information systems. This study analyzes the implementation of RBAC in the context of Enterprise Resource Planning (ERP) applications and cloud-based, mobile, and multi-domain systems. Using a systematic literature review (SLR) methodology, this study synthesizes findings from various studies to evaluate the effectiveness of RBAC in addressing challenges such as data privacy, regulatory compliance, and access policy complexity. The results show that the integration of intelligent technologies, s
APA, Harvard, Vancouver, ISO, and other styles
5

Nyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.

Full text
Abstract:
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little attention is given to the precursors: role strain, role ambiguity, and role conflict. These constructs provide more significant insights into RBAC design in Knowledge Management Systems (KMS). KMS is the technology-based knowledge management tool used to acquire, store, share, and apply knowledge for improved collaboration and knowledge-value cr
APA, Harvard, Vancouver, ISO, and other styles
6

Ooi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.

Full text
Abstract:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran enzymatically treated with Lentinus edodes mycelium. This review explores biologically active compounds and mechanisms of action that support RBAC as an immunomodulating nutraceutical in generally healthy and/or aging individuals. Thirty-seven (n = 37) primary research articles fulfilled the selection criteria for review. Most research is based on Biobran MGN-3, which consists of complex heteropolysaccharides with arabinoxylan as its primary structure while also containing galactan and glucan. RBAC was found to invoke im
APA, Harvard, Vancouver, ISO, and other styles
7

Ooi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.

Full text
Abstract:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this rice bran derivative to be a potent immunomodulator, which also possesses anti-inflammatory, antioxidant, and anti-angiogenic properties. To date, research on RBAC has predominantly focused on its immunomodulatory action and application as a complementary therapy for cancer. Nonetheless, the clinical applications of RBAC can extend beyond canc
APA, Harvard, Vancouver, ISO, and other styles
8

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.

Full text
Abstract:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n=12 RBAC and n=11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were ass
APA, Harvard, Vancouver, ISO, and other styles
9

de Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.

Full text
Abstract:
Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the
APA, Harvard, Vancouver, ISO, and other styles
10

Mitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RBAC"

1

Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.

Full text
Abstract:
L'obiettivo della tesi è la creazione di un'infrastruttura di tipo RBAC (Role Based Access Control), adibita al controllo degli accessi all'interno del linguaggio di coordinazione TuCSoN. Il punto di partenza si basa sull'analisi del lavoro sviluppato dall'Ing. Galassi: "Modello di sicurezza e controllo di accesso in una infrastruttura di coordinazione: architettura e implementazione". Usando questa come base teorica di partenza, si sono estrapolati i concetti chiave e si è data vita ad un'implementazione funzionante e di semplice utilizzo di RBAC in TuCSoN.
APA, Harvard, Vancouver, ISO, and other styles
4

Darwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.

Full text
Abstract:
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifications. We also suggest algorithms that define the semantics of authorization decisions in CORBA, EJB, and COM+. Using the formalized protection state configurations, we analyze the level of support for
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.

Full text
Abstract:
The problems of identity management inherent in distributed subscription-based resource sharing are investigated in this thesis. The thesis introduces a concept of authentication delegation and distributed RBAC (DRBAC) to support fine granular access control across multiple autonomous resource sites and subscribing sites. The DRBAC model extends the RBAC model to a distributed environment. A prototype system based on the concepts of authentication delegation and distributed role and the distributed RBAC model has been implemented and tested. Access is allowed based on the distributed roles, su
APA, Harvard, Vancouver, ISO, and other styles
6

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases
APA, Harvard, Vancouver, ISO, and other styles
7

Squarcina, Marco <1984&gt. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.

Full text
Abstract:
Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy specifications arising from system administrators' needs, formally verifying that access control systems enforce some defined security invariants is a problem of crucial importance. In a previous work which has been accepted for presentation at IEEE CSF 2012, we developed a framework for the formal verification of Grsecurity RBAC, an access control system developed on top of Unix/Linux systems. In this thesis we improve the framework by considering the intera
APA, Harvard, Vancouver, ISO, and other styles
8

Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.

Full text
Abstract:
Made available in DSpace on 2015-02-04T21:45:26Z (GMT). No. of bitstreams: 1 Vanderlei Costa.pdf: 1535805 bytes, checksum: 1edf57ffedf62a0db7a4c94312b486d6 (MD5) Previous issue date: 2008-10-03<br>Plataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é
APA, Harvard, Vancouver, ISO, and other styles
9

Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.

Full text
Abstract:
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended users can access resources and only the required access to accomplish some task will be given. In this context, Role Based Access Control (RBAC) has been established as one of the most important paradigms of access control. In an organization, users receive responsibilities and privileges through roles and, in AC systems implementing RBAC, permissions are granted through roles assigned to users. Despite the apparent simplicity, mistakes can occur during the development of RBAC systems and lead t
APA, Harvard, Vancouver, ISO, and other styles
10

Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.

Full text
Abstract:
Kontrola pristupa odnosno autorizacija, u &scaron;irem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "RBAC"

1

Fischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Edited by Rainer Bischoff. Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Filho, Oscar Gomes. RBAC, Rio Branco Atlético Clube: História e conquistas, 1913-1987. [s.n.], 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

assot͡siat͡sii͡a, Rossiĭskai͡a bibliotechnai͡a. RBA. Rossiĭskai͡a bibliotechnai͡a assot͡siat͡sii͡a, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meroni, Germana, ed. TRIM/RBCC Proteins. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meroni, Germana. TRIM/RBCC proteins. Springer Science+Business Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sbrang char rtsom sgrig khang. Lang tshoʼi rbab chu. Mtsho-sngon Mi-rigs Dpe-skrun Khang, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

ʼGyur-med. Ling tsho'i rbab chu. Mtsho-sngon mi rigs dpe skrun khang, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Corp, INDUS, and United States. Environmental Protection Agency. Control Technology Center, eds. User's manual for the RBLC BBS. Control Technology Center, U.S. Environmental Protection Agency, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Katcharian, Hope. Risk-Based Corrective Action (RBCA) at petroleum contaminated sites: The rationale for RBCA and natural attenuation. Available from National Technical Information Service, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Corp, INDUS, Clean Air Technology Center (U.S.), and United States. Environmental Protection Agency. Office of Air Quality Planning and Standards. Information Transfer Group, eds. User's manual for the RBLC data base. Information Transfer Group, Office of Air Quality Planning and Standards, U.S. Environmental Protection Agency, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "RBAC"

1

Subramanian, Shiva. "Kubernetes RBAC." In Deploy Container Applications Using Kubernetes. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9277-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Lunwei, Lifeng Wei, Xiangke Liao, and Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model." In Grid and Cooperative Computing - GCC 2004 Workshops. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Molesini, Ambra, Enrico Denti, and Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE." In Engineering Societies in the Agents World IX. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oleshchuk, Vladimir. "Trust-Aware RBAC." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barker, Steve, Paul Douglas, and Terry Fanning. "Implementing RBAC Policies." In Research Directions in Data and Applications Security. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandran, Suroop Mohan, and J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu, and Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps." In Human Centered Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RBAC"

1

Kirkpatrick, Michael S., Maria Luisa Damiani, and Elisa Bertino. "Prox-RBAC." In the 19th ACM SIGSPATIAL International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertino, Elisa, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. "GEO-RBAC." In the tenth ACM symposium. ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Youman, Charles E. "RBAC transition." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferrara, Anna Lisa, Georg Fuchsbauer, and Bogdan Warinschi. "Cryptographically Enforced RBAC." In 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coyne, Edward J. "Prioritizing RBAC features." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sandhu, Ravi. "Issues in RBAC." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ouyang, Kai, and James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time." In 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ferreira, Ana, David Chadwick, Pedro Farinha, et al. "How to Securely Break into RBAC: The BTG-RBAC Model." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RBAC"

1

Hull, Julie, and Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1124080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Winters, Paul, Benjamin Wakefield, Irene Toma, Anneke Schmider, Frini Chantzi, and Osman Dar. Facilitating progress towards SDG2: Zero Hunger. Royal Institute of International Affairs, 2022. http://dx.doi.org/10.55317/9781784135072.

Full text
Abstract:
Sustainable Development Goal 2: Zero Hunger (SDG2) remains out of reach. SDG2 progress has slowed over the last few years, and the impact of the COVID-19 pandemic is expected to exacerbate the problem. Improving the leadership, governance and coordination of the three UN Rome-based agencies (RBAs) – the Food and Agriculture Organization (FAO), the International Fund for Agricultural Development (IFAD) and the World Food Programme (WFP) – is crucial to achieving this objective. Lessons from comparable institutions, such as the International Monetary Fund, the World Bank Group and the World Heal
APA, Harvard, Vancouver, ISO, and other styles
4

Celhay, Pablo, Sebastian Martinez, and Pedro Bernal. Is Results-Based Aid More Effective than Conventional Aid?: Evidence from the Health Sector in El Salvador. Inter-American Development Bank, 2018. http://dx.doi.org/10.18235/0011812.

Full text
Abstract:
Results-based aid (RBA) models link funds to outcomes, rather than paying for inputs. Despite their theoretical appeal and recent adoption by donors and multilateral development banks, there is limited empirical evidence supporting this form of aid for national governments. We estimate the effects of a RBA model using a natural experiment in El Salvador, where the same community health intervention was implemented in 98 municipalities using one of three financing models. The Salud Mesoamerica Initiative funded fourteen municipalities with a RBA model that partially conditions funds on the atta
APA, Harvard, Vancouver, ISO, and other styles
5

Ou, Sivhuoch. A Rights-Based Approach to Development: A Cambodian Perspective. Cambodia Development Resource Institute, 2015. https://doi.org/10.64202/wp.101.201508.

Full text
Abstract:
The rights-based approach (RBA) to development emerged as a new and relatively authoritative paradigm, starting from the late 1990s. At its core is the argument that human rights and development converge and, unless the socio-economic rights of the poor are attained, poverty cannot be alleviated. Its approach is to shift NGOs’ strategy from providing charity to empowering the poor politically so that they are able to claim their rights. Recently, major bilateral and multilateral donors and international non-government organisations have been gradually adopting the approach. Significant resourc
APA, Harvard, Vancouver, ISO, and other styles
6

Samios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1093764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/972031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

ORGANIZERS: OZAKI, S., and N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/15020005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

En'yo, Hideto, and Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

สุวัฑฒน, ดวงสมร, วีระพงศ์ โกยกุล та วิวัฒน์ ชวนะนิกุล. การศึกษาโครโมโซมในโคที่มีท่อปัสสาวะผิดปกติแต่กำเนิด. จุฬาลงกรณ์มหาวิทยาลัย, 2000. https://doi.org/10.58837/chula.res.2000.47.

Full text
Abstract:
โคเพศผู้พันธุ์ผสมบราห์มันอายุ 6 ปี มีความผิดปกติของท่อปัสสาวะแต่กำเนิด ทำให้ปัสสาวะไหลออกทางด้านล่างของท่อปัสสาวะ จากการตรวจพบว่าความผิดปกตอของท่อปัสสาวะเป็นชนิด hypospadia และลึงค์มีขนาดเล็ก และสั้นกว่าปกติ (penile hypoplasia) การตรวจวิเคราะห์โครโมโซมด้วยวิธีธรรมดา และการย้อมสีพิเศษ (GTG - และ RBA - banding) พบว่าคาริโอไทป์เป็นแบบ 60; XY เช่น โคเพศผู้ปกติทั่วไป ระดับฮอร์โมนเทสโทเตอโรน เอสตราไดออล และโปรเจสเทอโรนอยู่ในระดับปกติ จากลักษณะทั้งหมดโคตัวนี้ควรถูกจัดในจำพวกภาวะกะเทยเทียมเพศผู้ 9male pseudohermaphroditism) การหาสาเหตุที่แท้จริงของความผิดปกตินี้ ควรทำการศึกษาต่อเนื่องในเรื่องจุลกายวิภ
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!