Model-independent radiative corrections toMl3±decays

1981 ◽  
Vol 23 (11) ◽  
pp. 2603-2609 ◽  
Author(s):  
Augusto García ◽  
Mario Maya
2007 ◽  
Vol 22 (27) ◽  
pp. 4891-4899 ◽  
Author(s):  
N. F. BELL

The existence of a neutrino magnetic moment implies contributions to the neutrino mass via radiative corrections. We derive model-independent "naturalness" upper bounds on the magnetic moments of Dirac and Majorana neutrinos, generated by physics above the electroweak scale. For Dirac neutrinos, the bound is several orders of magnitude more stringent than present experimental limits. However, for Majorana neutrinos the magnetic moment bounds are weaker than present experimental limits if μν is generated by new physics at ~ 1 TeV , and surpass current experimental sensitivity only for new physics scales > 10 – 100 TeV . The discovery of a neutrino magnetic moment near present limits would thus signify that neutrinos are Majorana particles.


2017 ◽  
Vol 62 (1) ◽  
pp. 3-11
Author(s):  
G.I. Gakh ◽  
◽  
M.I. Konchatnij ◽  
N.P. Merenkov ◽  
◽  
...  

2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


Sign in / Sign up

Export Citation Format

Share Document