Littérature scientifique sur le sujet « Security policie »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security policie ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Security policie"
Supriyanto, Eko Eddya, Meida Rachmawati et Fibry Jati Nugroho. « Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0 ». Jurnal Bina Praja 13, no 2 (31 août 2021) : 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.
Texte intégralAntonius, Rachad, Micheline Labelle et François Rocher. « Canadian Immigration Policies : Securing a Security Paradigm ? » International Journal of Canadian Studies, no 36 (2007) : 191. http://dx.doi.org/10.7202/040782ar.
Texte intégralAchmad, Farid Yusuf Nur. « Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau ». Kybernan : Jurnal Studi Kepemerintahan 1, no 1 (1 mars 2016) : 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.
Texte intégralPoincignon, Yann. « Defense Academy Excellence European Union Civilian Policing : Foreign Policy Action or Internal Security Tool ». Connections : The Quarterly Journal 02, no 2 (2003) : 111–30. http://dx.doi.org/10.11610/connections.02.2.12.
Texte intégralHelmy, Army Fuad. « PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN ». Badamai Law Journal 1, no 2 (1 septembre 2016) : 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Texte intégralElbably, Amar. « سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة ». Security Policy Paper 2, no 2 (31 décembre 2021) : 1–20. http://dx.doi.org/10.26735/hjoo8882.
Texte intégralSchneider, Fred B. « Enforceable security policies ». ACM Transactions on Information and System Security 3, no 1 (février 2000) : 30–50. http://dx.doi.org/10.1145/353323.353382.
Texte intégralPotter, Bruce. « Wireless security policies ». Network Security 2003, no 10 (octobre 2003) : 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.
Texte intégralMatvejevs, Aleksandrs. « Problems of Police Activity in Ensuring Public Order and Public Safety ». SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no 21 (2021) : 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.
Texte intégralMcIlwraith, Angus. « Security policies — A security officer's perspective ». Computer Audit Update 1993, no 8 (août 1993) : 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.
Texte intégralThèses sur le sujet "Security policie"
MUTTI, Simone. « Policy and Security Conguration Management in Distributed Systems ». Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Texte intégralSchlittler, Maria Carolina de Camargo. « "Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP ». Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.
Texte intégralApproved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Made available in DSpace on 2017-08-01T19:15:57Z (GMT). No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5) Previous issue date: 2016-09-06
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Cette thèse analyse la relation entre les pratiques policières quotidiennes et la conformation avec la police militaire de l'Etat de São Paulo, responsable pour mantenir l’ordre. Issu d’entretiens et d’analyses de données officielles, le présent travail cherche à comprendre comment les policiers, lors de leurs opérations, sélectionnent les personnes qui subiront les actions de la police et, par conséquent, celles du système de justice criminelle. Partant de là, il a été possible de comprendre, de manière plus particulier, quels sont les publics et les crimes les plus surveillés par les policiers militarisés et, d'une manière globale, les caractéristiques du modèle de police ostensible de São Paulo. L'objectif des opérations policières ostensibles est de prendre en flagrant délit des suspects criminels, ce qui confère à la Police Militaire la responsabilité de sélectionner et « d’expulser » des rues tous ceux que les policiers identifient comme des criminels. Cela autorise la Police Militaire à avoir recours notamment à trois actions : a) l’arrestation ou b) l’élimination des personnes identifiées comme des criminelles et c) le « bon sens » du policier en tant qu’outil pour distinguer les criminels et les « bons citoyens ». Une des conclusions de cette recherche repose sur le constat d’un ample usage du « bon sens » policier lors des opérations de vigilance ostensible, ainsi que de son aspect racial. De ce fait, le « bon sens » policier, au même titre que la létalité et les arrestations, est devenu le responsable de l’accumulation de désavantages pour la population jeune et noire, en ce qui concerne le droit à la vie en sécurité ; en effet on observe que ce groupe risque beaucoup plus d’aller en prison que le reste de la population. De plus, nous avons constaté que pendant les vingt dernières années la politique sécuritaire menée dans São Paulo s’est focalisé sur le type de vigilance ostensible décrit ci-dessus, et ce en dépit de l’échec de l’opération pour ce qui concerne la diminution du nombre de crimes contre les biens à São Paulo.
This thesis analyzes the relation between daily police practices and the conformation with ostensible policing run by the Military Police of São Paulo State. This work started from interviews and analysis of official data to understand how the Military Police, during the ostensible policing, selects the people who will suffer the police approach and therefore the prosecution of the criminal justice system. Thenceforth it was possible to understand specifically which public and which crimes were most closely watched by the military police and, in an embracing way, the characteristics of the São Paulo ostensible policing model. The purpose of ostensible policing is to catch criminal suspects, implying to the Military Police the responsibility to select and remove from the streets those who the police itself identifies as “bandits”. It is also observed that this framework does not configure a public security policy, but a crime and violence management, marked by the "war" against certain types of crimes that are available to the Military Police, especially with three features: a) imprisonment; b) elimination of those identified as “bandits”, and c) the “police scent” as a differentiation tool to identify "bandits" and "good citizens". One of the study highlights is that the wide use of the “police scent” by the military police which has racial aspects in its composition added to the lethality and imprisonment, became responsible for the accumulation of disadvantages for the young black population, referring to the right to secure life and a higher risk of being arrested for property offenses in relation to the rest of the population. In all, it became clear that in the last twenty years there is an insistence from the state public security in an ostensible policing with such characteristics, even in the face of failure in the decrease of numbers of property offenses in the state of São Paulo.
A tese analisa a articulação entre práticas policiais cotidianas e a conformação do policiamento ostensivo militarizado protagonizado pela Polícia Militar. O presente trabalho partiu de entrevistas e análise de dados oficiais da segurança pública paulista para compreender como os policiais, durante o policiamento ostensivo, selecionam as pessoas que sofrerão as investidas da polícia e, por conseguinte, do sistema de justiça criminal. A partir daí foi possível entender, de forma específica, quais são os públicos e os crimes mais vigiados pelos policiais militares e, de forma abrangente, as características do modelo de policiamento ostensivo paulista. Constatou-se que o objetivo do policiamento ostensivo é flagrar suspeitos criminais, o que incute à PM a responsabilidade de selecionar e “retirar” das ruas aqueles que os policiais identificam como “bandidos”. Para tal estão disponíveis à PM, sobretudo, três recursos: a) o aprisionamento ou b) a eliminação daqueles identificados como bandidos e c) o tirocínio policial enquanto ferramenta para diferenciar “bandidos” e “cidadãos de bem”. Uma das conclusões da pesquisa é a constatação da ampla utilização do tirocínio pelos policiais que atuam no policiamento ostensivo e de seu aspecto racializado; isto significa que, para a fundamentação da suspeita policial, são utilizados marcadores raciais. Desta forma, o tirocínio, ao lado da letalidade policial e do aprisionamento se tornaram responsáveis pelo acúmulo de desvantagens para a população jovem e negra, no que tange ao direito à vida segura e a um maior risco de serem presos por crimes patrimoniais em relação ao restante da população. No mais, constatou-se que nos últimos vinte anos há uma insistência por parte da segurança pública paulista num policiamento ostensivo com tais características, mesmo diante do insucesso na diminuição no número de crimes patrimoniais no estado de São Paulo.
SQUILLACE, LAURA. « Praia para quem ? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro ». Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.
Texte intégralThe beaches of Rio de Janeiro are considered one of the most democratic areas of leisure in the city, with free access and a heterogeneous public coming from different neighborhoods and belonging to different social classes. Despite this, the Operação Verão (Operation Summer), a security policy executed on the beaches by the Military Police and the Municipal Guard of Rio de Janeiro, may question the limits of this democracy. Among its objectives, the Operação Verão aims to prevent the so-called arrastões, a collective form of theft and robbery, supposedly committed by groups of young people and adolescents from the suburbs. Consequently, this category becomes one of the main targets of the Operação Verão. Through an ethnographic observation of the Operação Verão, carried out by accompanying law enforcement agents in their work, this thesis seeks to understand the mechanisms of social and spatial control in the context of beach leisure in Rio de Janeiro. In addition, this research is based on the result of interviewing other actors who interact in this public space: youth from the suburbs, subjected to a continuous surveillance; the public of the beach, which generates the demand for security in the coastal area and other people who work over there. The interviews conducted and the ethnographic study of the monitoring of the security forces during the Operação Verão guide the reading of the interaction in this public space. All this also shows the limitations that this measure provides in regards of the access to the beach to groups of youths and adolescents from the suburbs, considered a threat to public security. The goal of the thesis is to present the Operação Verão through a qualitative analysis and to demonstrate how the demand for a safer beach could generate a mechanism of discrimination and could compromise free access to the beach for a segment of population already historically criminalized and excluded in Rio de Janeiro: the youth from the suburbs.
Lim, Yow Tzu. « Evolving security policies ». Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.
Texte intégralGuillén, Lasierra Francesc. « Modelos de policía y seguridad ». Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.
Texte intégralThis thesis aims at stressing the importance of the diverse ideal conceptions of policing (models) that constitute the grounds for police organisations and policing. All of them have made contributions to the service with which the police provide the citizens and, at the same time, have evidenced shortcomings and limitations. The idea sustained in this work is that policing models (and consequently security models) are not theoretical constructions without any influence in daily policing, but, to the contrary, they are extremely relevant for the diverse areas of policing. Models stem from different legitimacies and affect the nuclear aim of policing (the mission), relationships with citizens, public order management, the structure and dynamics of police organisation and the systems of accountability and efficiency indicators as well. The first chapters begin with the description of the context in which the police appears as an institution of formal social control and the material field of policing focusing on its most substantial elements in order to build models up (police culture, mission, relationships with citizens, public order, organisation and accountability). Then, three models are defined: the governmental, the professional and community policing or public service policing. The governmental model gets its legitimacy from a representative Government in the framework of the rule of law with state powers balance, law abiding and judiciary control. It is a model with some tendency to be influenced by political power, in which citizens are more or less important depending on political junctures; police organisation is just an instrument to transmit orders, management of public order and gathering and treatment of information are crucial objectives for the police. The professional model is based on police professional knowledge (such as doctors or architects) in the framework of law; war on crime constitutes its mission, although it also tackles traffic police and public order; citizens or politicians should have no role in policing due to their lack of knowledge. Community policing or public service policing is thought from the citizens, for them and with them, police become a service addressed their needs with their collaboration and their opinion is the chore reference to assess the police. After having thoroughly described the three models, modern strategies of policing that have dominated criminological debates in last decades are discussed (Problem Oriented Policing, Intelligence-led Policing, Broken Windows Policing, and Reassurance Policing) in order to evidence the reasons why they are not considered policing models. It is argued that they don’t constitute new models because they are not complete ideal constructions of policing. Nevertheless they bring methodological innovations into the pre-existent models that try to improve their efficiency. Finally, this thesis analyses current tendencies in existing police systems, stressing the influence of politicization, globalisation, new technologies and the economic crisis in police organisations. The study of these tendencies and the virtues and deficiencies of the different models discussed in previous chapters offer the bases for the conclusions about how police should be to be able to face future challenges of policing in a satisfactory way.
Hallett, Joseph. « Capturing mobile security policies precisely ». Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.
Texte intégralPersson, Magnus. « Building trust : The contradiction between security and democracy in post Apartheid South Africa ». Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.
Texte intégralBrooks, Jason L., et Jason A. Goss. « SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES ». Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Texte intégralThimamontri, Apinya. « Homeland Security Roles and Responsibilities : an Examination of Texas Police Chiefs’ Perceptions ». Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.
Texte intégralBrown, David A. « Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Texte intégralLivres sur le sujet "Security policie"
Žáček, Pavel. ŠtB na Slovensku za "normalizácie" : Agónia komunistickej moci v zvodkách tajnej policie. [Bratislava?] : Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.
Trouver le texte intégralWeiss, Tomáš. Role policie a armády v Evropské unii : Analýza evropské a národní úrovně s využitím případové studie České republiky. Praha : Univerzita Karlova v Praze, 2014.
Trouver le texte intégralLindsey, George. Canada's security policies. [Toronto, Ont.] : Canadian Institute of International Affairs, 2003.
Trouver le texte intégralStockholm International Peace Research Institute., dir. Policies for common security. London : Taylor & Francis, 1985.
Trouver le texte intégralAttwood, Tony. Secondary schools' security policies. Peterborough : First & Best in Education, 1998.
Trouver le texte intégralKapoor, H. L. Police, crime, and security. New Delhi : Ess Ess Publications, 1992.
Trouver le texte intégralJoseph, Carmel. Safety and security. Johannseburg : Friedrich Ebert Stiftung, South Africa Office, 2002.
Trouver le texte intégralLtd, Asia BioBusiness Pte. Food security policies in APEC. Singapore] : APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.
Trouver le texte intégralA, Campbell Andrew, dir. Water security : Conflicts, threats, policies. Denver, CO : DTP Publishing, 2011.
Trouver le texte intégralL, Green James, et United States. National Aeronautics and Space Administration., dir. SPAN security policies and guidelines. 2e éd. [Washington, DC : National Aeronautics and Space Administration, 1989.
Trouver le texte intégralChapitres de livres sur le sujet "Security policie"
Meerts, Clarissa. « Police : Public Versus Private Policing ». Dans Encyclopedia of Security and Emergency Management, 1–4. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.
Texte intégralMeerts, Clarissa. « Police : Public Versus Private Policing ». Dans Encyclopedia of Security and Emergency Management, 775–79. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.
Texte intégralBeach, Derek. « Security Policies ». Dans Analyzing Foreign Policy, 151–71. London : Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.
Texte intégralLegrand, Tim, et Simon Bronitt. « Policing to a Different Beat : Measuring Police Performance ». Dans Policing and Security in Practice, 1–19. London : Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.
Texte intégralKabay, M. E., et Sean Kelley. « Developing Security Policies ». Dans Computer Security Handbook, 66.1–66.16. Hoboken, NJ, USA : John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.
Texte intégralCuppens, Frédéric, et Nora Cuppens-Boulahia. « Multilevel Security Policies ». Dans Encyclopedia of Cryptography and Security, 811–12. Boston, MA : Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.
Texte intégralNielson, Flemming, René Rydhof Hansen et Hanne Riis Nielson. « Adaptive Security Policies ». Dans Leveraging Applications of Formal Methods, Verification and Validation : Engineering Principles, 280–94. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.
Texte intégralDatta, Anupam, Somesh Jha, Ninghui Li, David Melski et Thomas Reps. « Analyzing Security Policies ». Dans Analysis Techniques for Information Security, 63–98. Cham : Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.
Texte intégralHerpolsheimer, Jens. « Regional security policies ». Dans Spatializing Practices of Regional Organizations during Conflict Intervention, 145–72. Abingdon, Oxon ; New York, NY : Routledge, 2021. | : Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.
Texte intégralClifton, Darrell. « Policies and Procedures ». Dans Hospitality Security, 37–58. 2e éd. New York : CRC Press, 2022. http://dx.doi.org/10.4324/9781003037644-2.
Texte intégralActes de conférences sur le sujet "Security policie"
Eyers, David M., Sriram Srinivasan, Ken Moody et Jean Bacon. « Compile-Time Enforcement of Dynamic Security Policies ». Dans 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.
Texte intégralWelch, Ian, et Fan Lu. « Policy-driven reflective enforcement of security policies ». Dans the 2006 ACM symposium. New York, New York, USA : ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.
Texte intégralTrivellato, Daniel, Nicola Zannone et Sandro Etalle. « A Security Framework for Systems of Systems ». Dans 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.
Texte intégralKotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova et Artem Tishkov. « Hybrid Multi-module Security Policy Verification ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.
Texte intégralSinghal, Anoop. « Web Services Security : Challenges and Techniques ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.
Texte intégralBarın, Nurgül Emine. « Principle of Interpretation in Favor of the Insuree in Turkish Social Security Law ». Dans International Conference on Eurasian Economies. Eurasian Economists Association, 2016. http://dx.doi.org/10.36880/c07.01754.
Texte intégralBasile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente et Antonio F. Gomez Skarmeta. « POSITIF : A Policy-Based Security Management System ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.
Texte intégralRoth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis et Ben Stock. « Complex Security Policy ? A Longitudinal Analysis of Deployed Content Security Policies ». Dans Network and Distributed System Security Symposium. Reston, VA : Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.
Texte intégralGunter, Carl A. « Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers ». Dans 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.41.
Texte intégralBrucker, Achim D., et Helmut Petritsch. « A Framework for Managing and Analyzing Changes of Security Policies ». Dans 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.47.
Texte intégralRapports d'organisations sur le sujet "Security policie"
Research Institute (IFPRI), International Food Policy. Developed country policies : Domestic farm policy reform and global food security. Washington, DC : International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.
Texte intégralSachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell et Travis Reid. Adaptive System Security Policies. Fort Belvoir, VA : Defense Technical Information Center, janvier 2002. http://dx.doi.org/10.21236/ada400196.
Texte intégralSchneider, Edward A., William Kalsow, Lynn TeWinkel et Michael Carney. Experimentation with Adaptive Security Policies. Fort Belvoir, VA : Defense Technical Information Center, juin 1996. http://dx.doi.org/10.21236/ada311215.
Texte intégralCarney, Michael, Brian Loe et Terrence Mitchem. Experience with Adaptive Security Policies. Fort Belvoir, VA : Defense Technical Information Center, mars 1998. http://dx.doi.org/10.21236/ada345381.
Texte intégralIrvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA : Defense Technical Information Center, septembre 2005. http://dx.doi.org/10.21236/ada605488.
Texte intégralGoebel, Peter. German Security Policy. Fort Belvoir, VA : Defense Technical Information Center, juin 1999. http://dx.doi.org/10.21236/ada385824.
Texte intégralSaito, Toshio. Japan's Security Policy. Fort Belvoir, VA : Defense Technical Information Center, mai 1999. http://dx.doi.org/10.21236/ada385898.
Texte intégralOmondi Okwany, Clifford Collins. Territoriality as a Method for Understanding Armed Groups in Kenya and Strengthening Policy Responses. RESOLVE Network, janvier 2023. http://dx.doi.org/10.37805/pn2023.1.lpbi.
Texte intégralSpencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen et Jay Lepreau. The Flask Security Architecture : System Support for Diverse Security Policies. Fort Belvoir, VA : Defense Technical Information Center, janvier 2006. http://dx.doi.org/10.21236/ada443108.
Texte intégralHalpern, Joseph Y. Formulating and Reasoning about Security Policies. Fort Belvoir, VA : Defense Technical Information Center, décembre 2004. http://dx.doi.org/10.21236/ada431396.
Texte intégral