Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Secure Compilation.

Статті в журналах з теми "Secure Compilation"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure Compilation".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon, and Karine Heydemann. "Reconciling optimization with secure compilation." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–30. http://dx.doi.org/10.1145/3485519.

Повний текст джерела
Анотація:
Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties ar
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Patrignani, Marco, Amal Ahmed, and Dave Clarke. "Formal Approaches to Secure Compilation." ACM Computing Surveys 51, no. 6 (2019): 1–36. http://dx.doi.org/10.1145/3280984.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Patrignani, Marco, and Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 1 (2021): 1–41. http://dx.doi.org/10.1145/3436809.

Повний текст джерела
Анотація:
Security-preserving compilers generate compiled code that withstands target-level attacks such as alteration of control flow, data leaks, or memory corruption. Many existing security-preserving compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully ab
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Patrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, and Frank Piessens. "Secure Compilation to Protected Module Architectures." ACM Transactions on Programming Languages and Systems 37, no. 2 (2015): 1–50. http://dx.doi.org/10.1145/2699503.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Abate, Carmine, Roberto Blanco, Ştefan Ciobâcă, et al. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation." ACM Transactions on Programming Languages and Systems 43, no. 4 (2021): 1–48. http://dx.doi.org/10.1145/3460860.

Повний текст джерела
Анотація:
Compiler correctness, in its simplest form, is defined as the inclusion of the set of traces of the compiled program in the set of traces of the original program. This is equivalent to the preservation of all trace properties. Here, traces collect, for instance, the externally observable events of each execution. However, this definition requires the set of traces of the source and target languages to be the same, which is not the case when the languages are far apart or when observations are fine-grained. To overcome this issue, we study a generalized compiler correctness definition, which us
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Andrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, et al. "Securing Verified IO Programs Against Unverified Code in F*." Proceedings of the ACM on Programming Languages 8, POPL (2024): 2226–59. http://dx.doi.org/10.1145/3632916.

Повний текст джерела
Анотація:
We introduce SCIO*, a formally secure compilation framework for statically verified programs performing input-output (IO). The source language is an F* subset in which a verified program interacts with its IO-performing context via a higher-order interface that includes refinement types as well as pre- and post-conditions about past IO events. The target language is a smaller F* subset in which the compiled program is linked with an adversarial context that has an interface without refinement types, pre-conditions, or concrete post-conditions. To bridge this interface gap and make compilation
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Blanton, Marina, Dennis Murphy, and Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.

Повний текст джерела
Анотація:
This work studies compilation of honest-majority semi-honest secure multi-party protocols secure up to additive attacks to maliciously secure computation with abort. Prior work concentrated on arithmetic circuits composed of addition and multiplication gates, while many practical protocols rely on additional types of elementary operations or gates to achieve good performance. In this work we revisit the notion of security up to additive attacks in the presence of additional gates such as random element generation and opening. This requires re-evaluation of functions that can be securely evalua
Стилі APA, Harvard, Vancouver, ISO та ін.
8

G, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers." International Journal of Computer Communication and Informatics 1, no. 1 (2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.

Повний текст джерела
Анотація:
The number of programming languages is getting more and more and developers are facing a tough time in installing all the compilers, libraries and supporting files for the development activities. Most of the time they want to experiment with new technologies, where the efforts required creating a complete environment to run the programs may not be feasible. On the other hand, several companies have started recruiting developers through their online programming platforms. In such situations, it is essential to protect the resources of the server from malicious programs written by the users by p
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jawade, Prashant Balkrishna, and S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment." Multiagent and Grid Systems 18, no. 1 (2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.

Повний текст джерела
Анотація:
The appliances that are received at a cloud data centre are a compilation of jobs (task) that might be independent or dependent on one another. These tasks are then allocated to diverse virtual machine (VM) in a scheduled way. For this task allocation, various scheduling policies are deployed with the intention of reducing energy utilization and makespan, and increasing cloud resource exploitation as well. A variety of research and studies were done to attain an optimal solution in a single cloud setting, however the similar schemes might not operate on multi-cloud environments. Here, this pap
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (2022): 9191. http://dx.doi.org/10.3390/app12189191.

Повний текст джерела
Анотація:
The addressing and discovering service is a vital infrastructure of the Internet. New applications and scenarios in next-generation networks rely on the secure and stable operation of domain name services, which puts forward new security challenges for the original domain name mechanism. While previous security enhancements of network services struggled to strike a balance between security, performance, and compatibility, hindering further use of core network services, the TEE (Trusted Computing Environment) technology can provide trusted and confidential services in untrusted network environm
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Ranjan, Nikhil. "Enhancing Voting Security and Efficiency." Journal of Computers, Mechanical and Management 2, no. 3 (2023): 9–15. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23065.

Повний текст джерела
Анотація:
This study explores developing and implementing a novel Electronic Voting Machine (EVM) system integrated with biometric identifiers to enhance voting security and efficiency significantly. Traditionally, voting processes relied on paper ballots, a system fraught with several challenges, including over-voting, the loss or misplacement of ballot papers, environmental harm due to paper consumption, and a lengthy result compilation process. An advanced EVM system is proposed to address these issues, leveraging unique biometric identifiers - facial recognition and fingerprints - for voter authenti
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Tolmach, Andrew, and Andrew W. Appel. "A Debugger for Standard ML." Journal of Functional Programming 5, no. 2 (1995): 155–200. http://dx.doi.org/10.1017/s0956796800001313.

Повний текст джерела
Анотація:
AbstractWe have built a portable, instrumentation-based, replay debugger for the Standard ML of New Jersey compiler. Traditional ‘source-level’ debuggers for compiled languages actually operate at machine level, which makes them complex, difficult to port, and intolerant of compiler optimization. For secure languages like ML, however, debugging support can be provided without reference to the underlying machine, by adding instrumentation to program source code before compilation. Because instrumented code is (almost) ordinary source, it can be processed by the ordinary compiler. Our debugger i
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Andersen, Gisle. "Semi-lexical features in corpus transcription." Compilation, transcription, markup and annotation of spoken corpora 21, no. 3 (2016): 323–47. http://dx.doi.org/10.1075/ijcl.21.3.02and.

Повний текст джерела
Анотація:
An aspect of corpus compilation that poses a particular challenge is the question of how to transcribe orthographically units that are not part of any standardised vocabulary. Among the problematic categories we find voiced pauses, minimal response signals, interjections, certain discourse markers, phonologically reduced forms, colloquialisms and dialect forms. Such semi-lexical features are usually represented by regular phonemic-graphemic correspondences but are nevertheless often inconsistently handled. This paper reviews a number of existing transcription guidelines and assesses whether th
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Martínez Pabón, Francisco Orlando, Jaime Caicedo Guerrero, Rodrigo Hernández Cuenca, Oscar Mauricio Caicedo Rendón, and Javier Alexander Hurtado Guaca. "SIM parameter-based security for mobile e-commerce settings." Ingeniería e Investigación 27, no. 2 (2007): 56–64. http://dx.doi.org/10.15446/ing.investig.v27n2.14830.

Повний текст джерела
Анотація:
Security requirements are more demanding in the e-commerce domain. However, mobile e-commerce settings not only insist on security requirements, they also require balance between security levels and hardware and usability device ability. These features require designing models having simple authentication and authorisation scheme which also ensures information integrity for each e-transaction. The Mobile and Wireless Applications’ Development Interest Group W@Pcolombia thus developed the P3SIM platform so that mobile applications might include SIM parameter-based security features. The P3SIM p
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Kandiy, S. О. "Analysis of pseudorandom number generation processes in EP CRYSTALS-Dilithium." Radiotekhnika, no. 213 (June 16, 2023): 18–30. http://dx.doi.org/10.30837/rt.2023.2.213.02.

Повний текст джерела
Анотація:
The paper provides an analysis of pseudorandom number generation processes in the Crystals-Dilithium post-quantum electronic signature scheme, a finalist in the NIST PQC post-quantum cryptography competition. The main focus is on the pseudo-random number generator based on the AES block cipher in counter mode. A formal model was built for this pseudo-random number generator that meets the requirements of the latest version of the AIS 31 standard, containing requirements for secure pseudorandom number generators. A pseudo-random number generator based on the AES block cipher in counter mode is
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Bogatyrev, Sergei. "The Patronage of Early Printing in Moscow." Canadian-American Slavic Studies 51, no. 2-3 (2017): 249–88. http://dx.doi.org/10.1163/22102396-05102016.

Повний текст джерела
Анотація:
This paper re-examines the view that printing and the distribution of printed books in Muscovy was a state monopoly. Like in many other pre-modern societies, the crown and the church were major patrons of printing. And, like in other patronage systems, there was no single approach to the press in Moscow. Ivan IV was interested in printing as a tool for enhancing prestige and securing salvation. The approaches of Orthodox hierarchs ranged from Metropolitan Makarii’s pragmatic aims to supply churches with liturgical books to reflective editing and the compilation of discursive colophons under Me
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Chmiel, Marta, Mateusz Korona, Fryderyk Kozioł, Krzysztof Szczypiorski, and Mariusz Rawski. "Discussion on IoT Security Recommendations against the State-of-the-Art Solutions." Electronics 10, no. 15 (2021): 1814. http://dx.doi.org/10.3390/electronics10151814.

Повний текст джерела
Анотація:
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected devices and services. These technologies collect, exchange and process data in order to dynamically adapt to a specific context. IoT is tightly bound to cyber-physical systems and, in this respect, has relevant security implications. A need for IoT security guidelines was identified by the industry in the early 2010s. While numerous institutions across the globe have proposed recommendations with a goal to help developers, distributors and users to ensure a secure IoT infrastructure, a strict set
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Jha, Sudan, Nishant Jha, Deepak Prashar, Sultan Ahmad, Bader Alouffi, and Abdullah Alharbi. "Integrated IoT-Based Secure and Efficient Key Management Framework Using Hashgraphs for Autonomous Vehicles to Ensure Road Safety." Sensors 22, no. 7 (2022): 2529. http://dx.doi.org/10.3390/s22072529.

Повний текст джерела
Анотація:
Autonomous vehicles offer various advantages to both vehicle owners and automobile companies. However, despite the advantages, there are various risks associated with these vehicles. These vehicles interact with each other by forming a vehicular network, also known as VANET, in a centralized manner. This centralized network is vulnerable to cyber-attacks which can cause data loss, resulting in road accidents. Thus, to prevent the vehicular network from being attacked and to prevent the privacy of the data, key management is used. However, key management alone over a centralized network is not
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Pásztor, L., J. Szabó, and Zs Bakacsi. "Application of the Digital Kreybig Soil Information System for the delineation of naturally handicapped areas in Hungary." Agrokémia és Talajtan 59, no. 1 (2010): 47–56. http://dx.doi.org/10.1556/agrokem.59.2010.1.6.

Повний текст джерела
Анотація:
EU’s Common Agricultural Policy encourages maintaining agricultural production in less favored areas (LFA) to secure both stable production and income to farmers and to protect the environment. Recently the delimitation of LFAs is suggested to be carried out using common biophysical diagnostic criteria on low soil productivity and poor climate conditions all over Europe. The criterion system was elaborated by European Commission’s Joint Research Center (JRC) and its operational implementation comes under member state competence. This process requires the existence of an adequate national spati
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Nazal, Muhammad Asghar, Reza Pulungan, and Mardhani Riasetiawan. "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 13, no. 3 (2019): 273. http://dx.doi.org/10.22146/ijccs.47267.

Повний текст джерела
Анотація:
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA)
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Jacobs, Koen, Dominique Devriese, and Amin Timany. "Purity of an ST monad: full abstraction by semantically typed back-translation." Proceedings of the ACM on Programming Languages 6, OOPSLA1 (2022): 1–27. http://dx.doi.org/10.1145/3527326.

Повний текст джерела
Анотація:
In 1995, Launchbury and Peyton Jones extended Haskell with an ST monad that allows the programmer to use higher-order mutable state. They informally argued that these state computations were safely encapsulated, and as such, that the rich reasoning principles stemming from the purity of the language, were not threatened. In this paper, we give a formal account of the preservation of purity after adding an ST monad to a simply-typed call-by-value recursive lambda calculus. We state and prove full abstraction when embedding the pure language into its extension with ST; contextual equivalences fr
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Brys, Carloa, and David Luis La Red Martínez. "GobLin: The GNU/Linux Operating System for Governments." Revista de Investigación en Tecnologías de la Información 10, no. 22 (2022): 1–14. http://dx.doi.org/10.36825/riti.10.22.001.

Повний текст джерела
Анотація:
Public administration must be at the forefront of innovation and technological paradigms. The Directorate of Management Modernization and Electronic Government of the province of Misiones, created a GNU/Linux operating system distribution, specially designed for public administration. The objective of this operating system is to provide an "all-in-one" package, containing all the applications that a government office may need, without unnecessary applications. This makes it easier for IT administrators and users to install and maintain the IT infrastructure. This distribution was built by rede
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Baunvig, Katrine F., Krista S. G. Rasmussen, Kristen Vad, and Per Møldrup-Dalum. "Storage over Rendition. Call for a Sustainable Infrastructure in the Digital Textual Heritage Sector with a Particular Interest in Digital Scholarly Editions." Digital Humanities in the Nordic and Baltic Countries Publications 5, no. 1 (2023): 240–47. http://dx.doi.org/10.5617/dhnbpub.10667.

Повний текст джерела
Анотація:
A significant amount of human and pecuniary resources has gone into the production of the long line of digital scholarly editions that within recent decades have sprung to life in Scandinavia, in the Baltic region, as well as in the rest of Europe. Notwithstanding the heritage perspective, the sector is paradoxically characterized by a presentist preoccupation with instant results – first and foremost with the rendition of the given data set. Concerns for long-term data management perspectives – that is: interest in the post-production afterlife of the data – is relatively meagre. This goes fo
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Zayana, Muhammad Rafiq, Iskandar Fitri, Fauziah Fauziah, and Aris Gunaryarti. "Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 6, no. 3 (2022): 386–94. http://dx.doi.org/10.35870/jtik.v6i3.446.

Повний текст джерела
Анотація:
In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Dickey, Timothy J. "RETHINKING THE SIENA CHOIRBOOK: A NEW DATE AND IMPLICATIONS FOR ITS MUSICAL CONTENTS." Early Music History 24 (July 14, 2005): 1–52. http://dx.doi.org/10.1017/s0261127905000124.

Повний текст джерела
Анотація:
A 1481 date for the manuscript Siena, Biblioteca Comunale degli Intronati, MS K. 1. 2 (hereafter Si), which contains almost ninety pieces of late fifteenth-century liturgical polyphony including works of Obrecht, Isaac and Mouton, has rested uneasily upon an argument from Sienese copying records. A fresh codicological analysis of this important source, including evidence of matching ‘twin’ watermark pairs in datable Tuscan archival documents, has yielded a new date and a new narrative for its compilation. The main corpus, in fact, is decades later than the fragmentary appendix containing works
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Purwanti, Pudji. "PERILAKU EKONOMI RUMAH TANGGA NELAYAN SKALA KECIL DALAM MENCAPAI KETAHANAN PANGAN DI PEDESAAN PANTAI JAWA TIMUR." Jurnal Sosial Ekonomi Kelautan dan Perikanan 4, no. 1 (2017): 31. http://dx.doi.org/10.15578/jsekp.v4i1.5817.

Повний текст джерела
Анотація:
Suatu rumah tangga dapat mencapai kondisi tahan pangan sangat berkaitan erat dengan perilaku ekonomi rumah tangga, dalam hal ini pengambilan keputusan rumah tangga dalam kegiatan produksi dan konsumsi, serta alokasi waktu kerja dan pendapatan rumah tangga. Penelitian ini menggambarkan perilaku rumah tangga nelayan skala kecil dalam mencapai ketahanan pangan di Kabupaten Pasuruan dan Kabupaten Trenggalek. Data primer dan sekunder digunakan dalam penelitian ini. Data primer diperoleh melalui survei lapang; sedangkan data sekunder diperoleh melalui studi dan kompilasi data statistik terkait topik
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Alabdulatif, Abdullah, Navod Neranjan Thilakarathne, and Kassim Kalinaki. "A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data." Electronics 12, no. 12 (2023): 2646. http://dx.doi.org/10.3390/electronics12122646.

Повний текст джерела
Анотація:
In the context of healthcare, big data refers to a complex compilation of digital medical data collected from many sources that are difficult to manage with normal technology and software due to its size and complexity. These big data are useful in various aspects of healthcare, such as disease diagnosis, early prevention of diseases, and predicting epidemics. Even though medical big data has many advantages and a lot of potential for revolutionizing healthcare, it also has a lot of drawbacks and problems, of which security and privacy are of the utmost concern, owing to the severity of the co
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Bori, Caterina. "Sira Culture, Hadith and the Veneration of Muḥammad in the Later Middle Period: Ibn Nāṣir al-Dīn al-Dimašqī (d. 842/1438) as a Case Study". Arabica 70, № 4-5 (2023): 376–435. http://dx.doi.org/10.1163/15700585-20231663.

Повний текст джерела
Анотація:
Abstract The article investigates the social and cultural practices of Sira production and consumption in the later Middle Period. It probes into the place held by Sira regarding the veneration of the Prophet, especially in relation to Hadith. Its first part shows that in the Middle Period Sira was intended as a vast literary repository characterized by fluidity of format, diverse social fruition, and plurality of practices in transmission and consumption. It was a literary field characterized by narrative malleability and creativity, for which there was popular demand and scholarly dedication
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Molina-Venegas, Rafael, Miguel Ángel Rodríguez, Manuel Pardo-de-Santayana, and David J. Mabberley. "A global database of plant services for humankind." PLOS ONE 16, no. 6 (2021): e0253069. http://dx.doi.org/10.1371/journal.pone.0253069.

Повний текст джерела
Анотація:
Humanity faces the challenge of conserving the attributes of biodiversity that may be essential to secure human wellbeing. Among all the organisms that are beneficial to humans, plants stand out as the most important providers of natural resources. Therefore, identifying plant uses is critical to preserve the beneficial potential of biodiversity and to promote basic and applied research on the relationship between plants and humans. However, much of this information is often uncritical, contradictory, of dubious value or simply not readily accessible to the great majority of scientists and pol
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Kelmere, Laila, and Ingrīda Jakušonoka. "THE COMPANY'S INSOLVENCY IMPACT ON TAX COLLECTION PROCESS." Science and Studies of Accounting and Finance: Problems and Perspectives 9, no. 1 (2014): 52–64. http://dx.doi.org/10.15544/ssaf.2014.06.

Повний текст джерела
Анотація:
Tax revenues are the key source of finance for the government’s budget. The state administration redistributes and allocates tax revenues for performing the state’s basic functions in order to ensure the overall development of the country and its population’s wellbeing. The availability of credit resources declined owing to the global crisis 2007-2009, which negatively affected the growth of Latvia’s national economy, and the total tax revenue decreased by 26.80% in 2009 compared with 2008. Latvia’s government, to secure the financing of its budget, stabilise Latvia’s financial system, raise t
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Afrohatul Laili, Afrohatul, and Endri Miftahus Sururi. "UPAYA KODIFIKASI HUKUM KEWARISAN SECARA BILATERAL DENGAN POLA DIFERENSIASI DALAM MASYARAKAT PLURALIS." SINDA: Comprehensive Journal of Islamic Social Studies 3, no. 1 (2023): 15–24. http://dx.doi.org/10.28926/sinda.v3i1.728.

Повний текст джерела
Анотація:
The currently applicable inheritance law in Indonesia is pluralistic in nature since it is formed collectively by adat, Islamic, and western legal systems; not to mention the diverse custom, ethnicity, and belief. Hence, codification of bilateral inheritance law that could address differences in our inheritance and kinship system is needed. Islamic Inheritance Law is a law that regulates heritage treasure of someone who has passed away and given to the beneficiary.Indonesia has set the Compilation of Islamic Law Islamic law of inheritance, such as heirs and inheritance. In the Compilation of I
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Purkon, Arip. "Problems of Islamic Law Compilation In Indonesia." SALAM: Jurnal Sosial dan Budaya Syar-i 5, no. 2 (2018): 91–98. http://dx.doi.org/10.15408/sjsbs.v5i2.9406.

Повний текст джерела
Анотація:
Abstract.Islamic Law Compilation is one of the efforts to implement Islamic law in Indonesia constitutionally. Islamic Law Compilation covers three legal fields, namely marriage, inheritance and benefiction. The Islamic Law Compilation contributes positively in providing legal certainty, especially for judges in religious courts. In addition, there are still a number of problems related to the Islamic Law Compilation, namely the issue of socialization, equality of perception and the fear of reducing Islamic law.Keywords: Islamic Law Compilation, Marriage Law, Inheritance Law, Benefaction Abstr
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Popov, A. A. "Digitalization of Ensuring Metrological Traceability of Measuring Instruments and Reference Materials through Cloud-Based Technologies: Current State and Development Prospects." Measurement Standards. Reference Materials 18, no. 3 (2022): 57–70. http://dx.doi.org/10.20915/2077-1177-2022-18-3-57-70.

Повний текст джерела
Анотація:
The accelerated implementation of digital technologies in the economy and social sphere is one of the national priorities in the Russian Federation. One of the components of this stage of industrial development is the creation of a comprehensive cloud platform for the complete automation of metrological centers and the implementation of the strategy for ensuring the uniformity of measurements ≪Metrology 4.0≫. Considering the numerous advantages of implementing digital systems and services, the integration of digital systems into life is associated with a number of difficulties, such as the lac
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Dopp, Alex R., Marie-Rachelle Narcisse, Peter Mundey, et al. "A scoping review of strategies for financing the implementation of evidence-based practices in behavioral health systems: State of the literature and future directions." Implementation Research and Practice 1 (January 2020): 263348952093998. http://dx.doi.org/10.1177/2633489520939980.

Повний текст джерела
Анотація:
Background: Increased availability of evidence-based practices (EBPs) is essential to alleviating the negative public health and societal effects of behavioral health problems. A major challenge to implementing and sustaining EBPs broadly is the limited and fragmented nature of available funding. Method: We conducted a scoping review that assessed the current state of evidence on EBP financing strategies for behavioral health based on recent literature (i.e., post-Affordable Care Act). We defined financing strategies as techniques that secure and direct financial resources to support EBP imple
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Kauffman, Laurie, Erin Ehmke, Steven Schet, Arioene Vreedzaam, and Sue Boinski. "Dispersal patterns among three species of squirrel monkeys (Saimiri oerstedii, S. boliviensis and S. sciureus): I. Divergent costs and benefits." Behaviour 142, no. 5 (2005): 525–632. http://dx.doi.org/10.1163/1568539054352888.

Повний текст джерела
Анотація:
AbstractCurrent theory frames animal dispersal as an outcome of potentially complex, multi-factorial interactions and tradeoffs that may vary across individual, sex, rank, age, social group, species, habitat and time. Empirical data relevant to a broad range of the potential costs and benefits incurred by dispersal are, not surprisingly, limited for many mammals and other vertebrates. Here we present the first report on dispersal in a wild population of the Neotropical primate Saimiri sciureus (Primates: Cebidae). Long-term observations (1998-2001) of this squirrel monkey represent part of a b
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Nurwakhidah, Ana. "MANAJEMEN INFAQ SECARA SEKTORAL DI BAITUL MAAL HIDAYATULLAH (BMH) CABANG MALANG." Ar-Risalah: Media Keislaman, Pendidikan dan Hukum Islam 17, no. 1 (2019): 1. http://dx.doi.org/10.29062/arrisalah.v17i1.214.

Повний текст джерела
Анотація:
This study aims to describe the management of sectoral basis at BMH infaq Malang, analyzing constraints in the management of sectoral basis at BMH Infaq Malang, and analyze the steps in Malang BMH anticipating the obstacles facing it. This research was qualitative research with the descriptive approach. In the study described the management of sectoral Basis Infaq Baitul Maal Hidayatullah (BMH) Malang. From the analysis results can be concluded that the implementation of the management of sectoral basis infaq Baitul Maal Hidayatullah (BMH) Malang is by applying the characteristics of Islamic m
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Romdhon, Muhammad Rizqi. "Kajian Tafsir Nusantara Terhadap Hukum Perkawinan Beda Agama Menurut Kompilasi Hukum Islam Indonesia." Al-Dzikra: Jurnal Studi Ilmu al-Qur'an dan al-Hadits 16, no. 2 (2022): 189–218. http://dx.doi.org/10.24042/al-dzikra.v16i2.12777.

Повний текст джерела
Анотація:
AbstractInterfaith marriage remains a controversial topic forbidden under the MUI (Indonesian Ulema Council) fatwa. However, Hamka claimed in Tafsir al-Azhar that marriage between Muslim men and women from the people of the Bible is permitted. This claim raises the question of whether the law regarding interreligious marriage in the Compilation of Islamic Law is consistent with the Indonesian insight interpretation. This study aims to determine the relationship between interfaith marriage law in the Compilation of Islamic Law and the Indonesian insight interpretation of verses related to inter
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Abid, H., Nandang Kusnadi, Yenny Febrianty, and Chairijah . "PENERAPAN TEORI KEADILAN PADA KEWARISAN ANAK ZINA." PALAR | PAKUAN LAW REVIEW 8, no. 1 (2022): 144–53. http://dx.doi.org/10.33751/palar.v8i1.4685.

Повний текст джерела
Анотація:
Abstrak Dalam konteks anak luar kawin yang terlahir dari hasil perzinaan, menurut hukum islam antara anak dan ayah biologisnya tidak ada nasab yang sah, maka tidak ada hak mewaris antara mereka berdua. Kompilasi Hukum Islam pun tidak memberikan kedudukan yang jelas terhadap keberadaan anak zina mengenai kewarisan anak zina. Penelitian ini bertujuan untuk mengetahui Penerapan Teori Keadilan terhadap kedudukan Anak Zina dalam Hukum Islam dan Kompilasi Hukum Islam tentang kewarisannya. Metode yang digunakan dalam penelitian ini adalah yuridis normatif empiris. Pengolahan data dilakukan secara des
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Darlis, Syamsul. "MARRIAGE FOR COVERING DISGRACE: The Practice of Kawi' Pura Tradition in the East Kolaka Muslim Society." Al-Ahwal: Jurnal Hukum Keluarga Islam 15, no. 1 (2022): 21. http://dx.doi.org/10.14421/ahwal.2022.15102.

Повний текст джерела
Анотація:
According to the Indonesian Compilation of Islamic Law (KHI), unmarried pregnant women may only be married to the men who impregnated them. However, this rule is frequently disregarded by the Kolaka Muslim society. They typically opt for kawi' pura tradition to tackle the case, which is to marry the pregnant woman to another man. This marriage is followed by a contract stipulating an immediate divorce. Its purpose is to conceal shame or disgrace. This article seeks to investigate the rationale behind the practice of kawi' pura. Data were collected through observation and interviews and then an
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Ristian, Ika. "PASAL-PASAL NUSYUZ ISTRI DALAM KOMPILASI HUKUM ISLAM DAN KEKERASAN DALAM RUMAH TANGGA." Jurnal Al-Hakim: Jurnal Ilmiah Mahasiswa, Studi Syariah, Hukum dan Filantropi 2, no. 2 (2020): 55–62. http://dx.doi.org/10.22515/alhakim.v2i2.2787.

Повний текст джерела
Анотація:
ABSTRACTMarriage is one thing that has broad consequences in the legal relationship between husband and wife. With marriage there arises a right and obligation. A wife who does not carry out her obligations in fiqh munakahat is called nushuz. In the Compilation of Islamic Law it is explicitly stated that the act of cheating is only done by a wife, and in this case the husband has the right to treat his wife who are cheating in the Compilation of Islamic Law explained that this cheating act of the wife can abort the income he gets from her husband. The rights of the husband are considered to be
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Hafidzi, Anwar. "Prasyarat Poligami Dalam Kitab Fiqih Islam Dan Kompilasi Hukum Islam Perspektif Maslahah Mursalah." Al-Daulah: Jurnal Hukum dan Perundangan Islam 7, no. 2 (2018): 366–92. http://dx.doi.org/10.15642/ad.2017.7.2.366-392.

Повний текст джерела
Анотація:
Abstract: This paper discusses about the problematic of the polygamy rules between text and context of the suitability of polygamy requirements stipulated in the Compilation of Islamic Law and some positive Indonesian law with the requirements and permissibility of polygamy in the book of Islamic Jurisprudence of Wahbah Zuhaili. According to Wahbah Zuhaili, the polygamy requirements are only two namely justice for their wives or children and a husband must be able to provide for the maintenance. Meanwhile, according to the Compilation of Islamic Law, several clauses explain the requirements th
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Endry, Endry, Muhammad Torik, and Bitoh Purnomo. "Pemanfaatan Sawah Warisan Secara Bergilir Menurut Hukum Islam dan Hukum Adat." Muqaranah 7, no. 2 (2023): 139–48. http://dx.doi.org/10.19109/muqaranah.v7i2.19581.

Повний текст джерела
Анотація:
The use of inherited rice fields in rotation is in accordance with customary inheritance law and article 189 KHI, namely using collective principles. This is not in accordance with the individual principle in Islamic inheritance law. One reason is that in the collective system there is a delay in the distribution of inherited assets. This has the potential to cause conflict. The formulation of the problem in this research is how to implement the use of heritage rice fields in rotation among the Mayapati Village community. The aim of the research is to examine through Islamic law and customary
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Husien, Syarief, and Akhmad Khisni. "Hukum Waris Islam Di Indonesia (Studi Perkembangan Hukum Kewarisan Dalam Kompilasi Hukum Islam Dan Praktek Di Pengadilan Agama )." Jurnal Akta 5, no. 1 (2017): 75. http://dx.doi.org/10.30659/akta.v5i1.2533.

Повний текст джерела
Анотація:
ABSTRAKPenelitian dengan judul ”Hukum Waris Islam Di Indonesia (Studi Perkembangan Hukum Kewarisan Dalam Kompilasi Hukum Islam Dan Praktek Di Pengadilan Agama )”Penelitian ini menggunakan pendekatan yuridis normative, dalam pengumpulan data lebih ditekankan pada sumber bahan primer, berupa peraturan perundang-undangan, menelaah kaidah-kaidah hukum maupun teori ilmu hukum yang terkait dengan masalah yang di teliti.Berdasarkan metode tersebut penelitian menghasilkan pada pokoknya : (1) Formulasi hukum kewarisan islam dalam fiqih dan Kompilasi Hukum Islam (a) Formulasi hukum kewarisan Islam dalam
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Purnama, Arif Sadikin, Matfa Kresna Maarifarsyah, Putri Rahayu Nengsih, Dewi Desiana, Yusuf Guntur Hari Putra, and Gita Anggraini. "Pendidikan Karakter Melalui Seni Teater Berbasis Kearifan Lokal Secara Daring untuk Anak-Anak Kampung Kumuh Pasar Keramat." ABDIMAS: Jurnal Pengabdian Masyarakat 3, no. 2 (2020): 351–59. http://dx.doi.org/10.35568/abdimas.v3i2.971.

Повний текст джерела
Анотація:
Keramat is the name of one of the markets in Sampit City which is mostly inhabited by the middle to lower economic population. Located in a congested area and market dumping waste directly into the river that flows under people's houses along with garbage that seems scattered in the river flow makes the settlement look very shabby. The children's daily activities here have to mingle with market waste and unhealthy rivers for bathing and playing. Often littering, fighting, and not caring about the environment are the daily sights of the children here. This community service is an activity of th
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Saniah, Saniah, and Syahib Natarsyah. "MODEL APLIKASI PEMBAGIAN HARTA WARISAN BERDASARKAN KOMPILASI HUKUM ISLAM BERBASIS WEB." Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi 9, no. 3 (2021): 181. http://dx.doi.org/10.35889/jutisi.v9i3.557.

Повний текст джерела
Анотація:
<p>Abstrak. Hukum kewarisan dalam Islam mendapat perhatian yang besar karena pembagian warisan sering menimbulkan akibat-akibat yang tidak menguntungkan bagi keluarga yang ditinggal mati. Warisan adalah soal apa dan bagaimana berbagai hak-hak dan kewajiban-kewajiban tentang kekayaan seseorang pada waktu ia meniggal akan beralih kepada keluarga yang masih hidup. Berdasarkan penelusuran yang dilakukan hukum online, kewarisan menempati posisi nomor dua buku tahunan Yurisprudensi Mahkamah Agung (MA) hampir setiap edisi terbitan dari tahun pertahun mengutip putusan perkara waris. Sebagian uma
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Musa, Musa. "Ahli Waris Pengganti Dalam Tinjauan Kompilasi Hukum Islam Dan Hukum Perdata." Isti`dal : Jurnal Studi Hukum Islam 7, no. 1 (2021): 53–78. http://dx.doi.org/10.34001/istidal.v7i1.2154.

Повний текст джерела
Анотація:
This study is intended to find out more about the provisions in the Compilation of Islamic Law and Civil Law, regarding the status of a replacement heir. Because there is a slight difference, if in BW this replacement has no limits, then in the KHI it is explained that this replacement is only up to the grandchildren, therefore there is a contradiction between the provisions of the replacement heirs in the Compilation of Islamic Law and Civil Law (BW). This study was conducted qualitatively using a juridical-normative approach. The normative approach is carried out by examining library materia
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Rusmono and Wisnu Djatmiko. "Penyusunan Bahan Pembelajaran Kompilasi Bagi Pengajar di SMK Negeri 1 Cibinong, Bogor Jawa Barat." Sarwahita 19, no. 01 (2022): 12–20. http://dx.doi.org/10.21009/sarwahita.191.2.

Повний текст джерела
Анотація:
Abstract
 In general, the form of learning at SMK Negeri I Cibinong Bogor is classroom learning using learning strategies and learning materials that refer to learning objectives. The competence of teachers in developing learning materials is considered to be still low, so it is necessary to make a training on Compilation of Compilation Learning Materials for teachers at SMK Negeri 1 Cibinong Bogor. The training was carried out using the method of applying science and technology directly to 55 teachers of public and private vocational schools in Cibinong Bogor using the Zoom application.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Mu’in, Fathul, Faisal Faisal, Arif Fikri, Habib Shulton Asnawi, and M. Anwar Nawawi. "THE PRACTICE OF SUBSTITUTE HAIRS IN INDONESIAN RELIGIOUS COURT: Restricted Interpretation." Al-Ahwal: Jurnal Hukum Keluarga Islam 16, no. 1 (2023): 141. http://dx.doi.org/10.14421/ahwal.2023.16107.

Повний текст джерела
Анотація:
As part of reformation outcomes, the substitute heir in Islamic inheritance law has been long heeded by Indonesian jurists. However, amidst the facet of the traditional scheme, Indonesian Religious Court judges (judex factie) have not shared the same implementation of this succession. This article endeavors to examine the practice of substitute heir in the field. Relies on the Religious Court decisions as the primary source, this article argues that the norm of substitute heir (Article 185 of The Compilation of Islamic Law) has been implemented restrictedly according to The Compilation and the
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Mustamiin, Muhamad, Adi Suheryadi, and Alifia Puspaningrum. "PENERAPAN SISTEM EVALUASI PEMBELAJARAN PEMROGRAMAN TERINTEGRASI DENGAN ONLINE JUDGE DI SMK." JURNAL PEKAMAS 2, no. 2 (2022): 61–67. http://dx.doi.org/10.46961/jpk.v2i2.636.

Повний текст джерела
Анотація:
Abstrak: Proses evaluasi hasil pembelajaran pemrograman seperti pengkoreksian jawaban terkait dengan kode program atau sintaks tertentu dalam pemrograman belum optimal dan perlu adanya suatu proses penilaian otomatis untuk membantu proses tersebut dengan menggunakan online judge. Online judge merupakan sebuah sistem yang mampu melakukan evaluasi secara mendalam dan melakukan kompilasi terhadap sintaks yang meliputi waktu eksekusi, compilation error dan lain sebagainya. Kegiatan pengabdian penerapan sistem evaluasi pembelajaran pemrograman terintegrasi dengan online judge pada mata pelajaran pe
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Shivakumar, Dr Sumathi. "Eternalising Cultural Memory Through Cultural Parallels in Literary Narratives." IJOHMN (International Journal online of Humanities) 3, no. 4 (2017): 65–74. http://dx.doi.org/10.24113/ijohmn.v3i4.34.

Повний текст джерела
Анотація:
Cultural memory represents the collective perceptions and creations of the distant past. Such collective memories are best documented and secured in Literature. What matters is not the real facts but rather the consensus of conventions shared by both the cultural history and the literary creator. However, literary narratives do not always give a compilation of such memories under a single wrap. It is on this distinctive point that Jakkana stands out in eternalising cultural memory. BasavarajNaikar’s novella, Jakkanna is the retelling of the life and history of the AmarsilpiJakkannacharya, the
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!