Skip to search formSkip to main contentSkip to account menu

Brewer and Nash model

The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This study analyses two speech events where president Chávez informs that he has incarcerated a judge. He demands the maximum… 
2013
2013
Among the technological developments pushed by the emergence of 3D Stacked IC technologies, temporary wafer bonding has become a… 
Highly Cited
2007
Highly Cited
2007
Two years ago, some of us wrote a paper predicting the demise of “One Size Fits All (OSFA)” [Sto05a]. In that paper, we examined… 
2006
2006
On 29 March 2006, a total eclipse of the Sun was visible on the Greek island Kastelorizo (36.150°N, 29.596°E). An extended set of… 
Review
2005
Review
2005
The order in which people freely recall a set of words, persons' names, or other items indicates how they organize those items in… 
2005
2005
The contemporary study of Hebrews is bedeviled by anachronistic assumptions that distort its interpretation. As a result, Hebrews… 
Highly Cited
1995
Highly Cited
1995
1. Introduction.- 2. Structures of EF-Hand Ca2+-Binding Proteins and Annexins.- 3. Gene Structures and Chromosomal Assignments of… 
1970
1970
This study, conducted in central Montana during the summers of 1968 and 1969, was designed to determine the effects of various…