Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,217,328 papers from all fields of science
Search
Sign In
Create Free Account
Two-man rule
Known as:
Four-eyes principle
, Two person control
, Four-eye principle
Expand
The two-man rule is a control mechanism designed to achieve a high level of security for especially critical material or operations. Under this rule…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Broader (1)
Access control
Bank vault
Buddy system
Command & Conquer: Red Alert 2
Key (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Sustainability Level of Management of “Pondok Dadap” Fish Auction Place to Support Marketing of Marine Fish in Sendangbiru, East Java
Z. Abidin
,
M. Primyastanto
2018
Corpus ID: 59134323
This research aims to analyze the level of sustainability management of fish auction place (TPI) Pondok Dadap. Methods of data…
Expand
2015
2015
Applying the four-eyes principle to management decisions in the manufacturing sector: Are large family firms one-eye blind?
M. Hiebl
2015
Corpus ID: 152428444
Purpose - – This paper aims to explore the application of the four-eyes principle (4EP) to management decisions in large family…
Expand
2015
2015
A novel image encryption method to reduce decryption execution time in cloud
P. Rad
,
Mohan Muppidi
,
A. Jaimes
,
S. Agaian
,
Mo M. Jamshidi
Annual IEEE Systems Conference (SysCon…
2015
Corpus ID: 19169536
Parallel computing on cloud infrastructure had gained tremendous attention and popularity in recent years. In this paper, we…
Expand
2013
2013
Business Process Security Analysis – Design Time, Run Time, Audit Time
Frank Böhr
,
Linh Thao Ly
,
G. Müller
it - Information Technology
2013
Corpus ID: 62660613
Abstract This paper reports on approaches and tool support for security and compliance analysis of executable business processes…
Expand
2011
2011
Jakość przekładu prawnego i prawniczego w świetle normy europejskiej PN-EN 15038 oraz hipotezy uniwersaliów translatorycznych
Łucja Biel
2011
Corpus ID: 119701596
Th e paper discusses the quality of legal translation under the EN 15038 standard of translation services and the hypotheses of…
Expand
2008
2008
Real time cryptography with dual key encryption
B. Lakshmi
,
T. N. Prabakar
,
E. Kirubakaran
International Conference on Computing…
2008
Corpus ID: 15087488
This paper presents a method of encryption that enhances the security of vital data against brute force attack. The method is…
Expand
Review
2005
Review
2005
Terahertz pulsed imaging and spectroscopy for chemical detection and security
D. Arnone
Joint 30th International Conference on Infrared…
2005
Corpus ID: 41784053
The terahertz region, between the microwave and infrared (50 GHz-4 THz or 1.3 cm/sup -1/-133 cm/sup -1/), represents the last…
Expand
2005
2005
The politics of sacrifice
G. Aichele
2005
Corpus ID: 62884482
I place Mark 10:45, one of the most-discussed verses in the gospel of Mark, in intertextual tension with the final episode of the…
Expand
2003
2003
Efficient Two Party Multi-Prime {RSA} Key Generation
Tobias Straub
2003
Corpus ID: 16856253
We present a new protocol which enables two parties to jointly generate a multi-prime RSA key pair such that neither party gains…
Expand
1997
1997
Tailored Patient Information: Some Issues and Questions
Ehud Reiter
,
Liesl Osman
arXiv.org
1997
Corpus ID: 14899565
Tailored patient information (TPI) systems are computer programs which produce personalised heath-information material for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required