6,485 research outputs found

    Current-Induced Resonant Motion of a Magnetic Vortex Core: Effect of Nonadiabatic Spin Torque

    Full text link
    The current-induced resonant excitation of a magnetic vortex core is investigated by means of analytical and micromagnetic calculations. We find that the radius and the phase shift of the resonant motion are not correctly described by the analytical equations because of the dynamic distortion of a vortex core. In contrast, the initial tilting angle of a vortex core is free from the distortion and determined by the nonadiabaticity of the spin torque. It is insensitive to experimentally uncontrollable current-induced in-plane Oersted field. We propose that a time-resolved imaging of the very initial trajectory of a core is essential to experimentally estimate the nonadiabaticity.Comment: 4 pages, 4 figure

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data
    • …
    corecore