PsycEXTRA Dataset 2005
DOI: 10.1037/e523562013-003
|View full text |Cite
|
Sign up to set email alerts
|

Harm reduction treatment: Principles and practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Indeed, this is the only requirement on simulations in [1,18,19]. If a simulation of scheme Simple safety analysis, i.e., determining whether an access control system can reach a state in which an unsafe access is allowed, was first formalized by Harrison et al [6] in the context of the well-known access matrix model [5,7]. In the HRU scheme [6], a protection system has a finite set of rights and a finite set of commands.…”
Section: Comparisons Based On Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, this is the only requirement on simulations in [1,18,19]. If a simulation of scheme Simple safety analysis, i.e., determining whether an access control system can reach a state in which an unsafe access is allowed, was first formalized by Harrison et al [6] in the context of the well-known access matrix model [5,7]. In the HRU scheme [6], a protection system has a finite set of rights and a finite set of commands.…”
Section: Comparisons Based On Security Analysismentioning
confidence: 99%
“…A set of access control schemes is an access control model. An example of an access control model is the access matrix model [5]. An example of a scheme based on the access matrix model is the HRU scheme [6] which specifies that state-transition rules are commands of a particular form.…”
Section: Introductionmentioning
confidence: 99%