Gotowa bibliografia na temat „SECURITY DOMAIN ENFORCEMENT”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SECURITY DOMAIN ENFORCEMENT”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "SECURITY DOMAIN ENFORCEMENT"

1

Camp, L. Jean. "Reconceptualizing the Role of Security User". Daedalus 140, nr 4 (październik 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.

Pełny tekst źródła
Streszczenie:
The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?
Style APA, Harvard, Vancouver, ISO itp.
2

van Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven i Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague". International Journal of Environmental Research and Public Health 19, nr 7 (26.03.2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.

Pełny tekst źródła
Streszczenie:
The sense of safety and security of older people is a widely acknowledged action domain for policy and practice in age-friendly cities. Despite an extensive body of knowledge on the matter, the theory is fragmented, and a classification is lacking. Therefore, this study investigated how older people experience the sense of safety and security in an age-friendly city. A total of four focus group sessions were organised in The Hague comprising 38 older people. Based on the outcomes of the sessions, the sense of safety and security was classified into two main domains: a sense of safety and security impacted by intentional acts and negligence (for instance, burglary and violence), and a sense of safety and security impacted by non-intentional acts (for instance, incidents, making mistakes online). Both domains manifest into three separate contexts, namely the home environment, the outdoor environment and traffic and the digital environment. In the discussions with older people on these derived domains, ideas for potential improvements and priorities were also explored, which included access to information on what older people can do themselves to improve their sense of safety and security, the enforcement of rules, and continuous efforts to develop digital skills to improve safety online.
Style APA, Harvard, Vancouver, ISO itp.
3

Grubač, Momčilo. "Enforcement of judgments according to European legal standards". Glasnik Advokatske komore Vojvodine 75, nr 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.

Pełny tekst źródła
Streszczenie:
The author gives an overview of the achievements of the 24th Conference of European Ministers of Justice, held in Moscow in October 2001, and in particular its section relating to enforcement of judgments. In the first part of the article, the author writes about enforcement of judgments containing a long-term imprisonment sentence. He analyzes in depth the conditions and rules on keeping prisoners, their education and employment, security of prisoners and personnel, conditional release, status of aliens and stateless persons, and relations between the prison system and private sector. In the second part of the article, the author writes about enforcement of judgments in civil matters and the respective strengthening and/or weakening of the state role in this domain.
Style APA, Harvard, Vancouver, ISO itp.
4

van Hardeveld, Gert Jan, Craig Webber i Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets". American Behavioral Scientist 61, nr 11 (październik 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.

Pełny tekst źródła
Streszczenie:
This work presents an overview of some of the tools that cybercriminals employ to trade securely. It will look at the weaknesses of these tools and how the behavior of cybercriminals will sometimes lead them to use tools in a nonoptimal manner, creating opportunities for law enforcement to identify and apprehend them. The criminal domain this article focuses on is carding, the online trade in stolen payment card details and the consequent criminal misuse of such data. However, these findings could be applied more broadly, as many of the analyzed tools are used across (cyber) criminal domains. This article is a continuation of earlier work, in which a crime script analysis of 25 carding tutorials presented the tools that cybercriminals use to cash-out stolen payment card details while remaining anonymous. We use these tutorials and an analysis of the literature to identify how they can be used incorrectly and create a typology of potential behavioral and technological pitfalls in these tools. Finally, we conclude that finding pitfalls in the usage of tools by cybercriminals has the potential to increase the efficiency of disruption, interception, and prevention approaches. However, in future work, interviews with law enforcement experts and convicted cybercriminals or still active users should be used to analyze the operational security of cybercriminals in more depth.
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa i Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17.07.2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.

Pełny tekst źródła
Streszczenie:
Green Security Games (GSGs) have been proposed and applied to optimize patrols conducted by law enforcement agencies in green security domains such as combating poaching, illegal logging and overfishing. However, real-time information such as footprints and agents’ subsequent actions upon receiving the information, e.g., rangers following the footprints to chase the poacher, have been neglected in previous work. To fill the gap, we first propose a new game model GSG-I which augments GSGs with sequential movement and the vital element of real-time information. Second, we design a novel deep reinforcement learning-based algorithm, DeDOL, to compute a patrolling strategy that adapts to the real-time information against a best-responding attacker. DeDOL is built upon the double oracle framework and the policy-space response oracle, solving a restricted game and iteratively adding best response strategies to it through training deep Q-networks. Exploring the game structure, DeDOL uses domain-specific heuristic strategies as initial strategies and constructs several local modes for efficient and parallelized training. To our knowledge, this is the first attempt to use Deep Q-Learning for security games.
Style APA, Harvard, Vancouver, ISO itp.
6

Yang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang i Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, nr 7 (29.03.2023): 3566. http://dx.doi.org/10.3390/s23073566.

Pełny tekst źródła
Streszczenie:
The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability, permanence and uniqueness), the security of biometric data is a key area of research. Security and privacy are vital to enacting integrity, reliability and availability in biometric-related applications. Homomorphic encryption (HE) is concerned with data manipulation in the cryptographic domain, thus addressing the security and privacy issues faced by biometrics. This survey provides a comprehensive review of state-of-the-art HE research in the context of biometrics. Detailed analyses and discussions are conducted on various HE approaches to biometric security according to the categories of different biometric traits. Moreover, this review presents the perspective of integrating HE with other emerging technologies (e.g., machine/deep learning and blockchain) for biometric security. Finally, based on the latest development of HE in biometrics, challenges and future research directions are put forward.
Style APA, Harvard, Vancouver, ISO itp.
7

Csaba, Zágon, i Zsolt Lippai. "The Borderline between Private and Public Security". Academic and Applied Research in Military and Public Management Science 20, nr 3 (26.05.2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.

Pełny tekst źródła
Streszczenie:
A few years ago, a White Paper was published by the Confederation of European Security Services (CoESS) with the collaboration of the Institut National des Hautes Études de Sécurité (INHES) on the security market of the European Union. The authors identified several reasons why public and private security providers in the member states share the market and why they are bound to cooperate for the public good, that is, the security itself. However, the states’ law enforcement capacities cannot cover all security demands of the public due to the finite (mainly budgetary) resources that always set capacity limits hence congestions in the assignments of police services occur from time to time. Private security operatives fill into the supply gaps occurring in a fragmented security landscape in Europe. Due to the variables in the market share, countries made their patterns in public and private security components, the statutory frameworks, and the traditions concerning the role played by the commercial security sector in overall security provisions. Here a typology may be formed from the clusters of countries following alternative approaches, respectively. There is a border zone between the two sectors. The exclusive public security domain gives way to areas of common interest and moves on to where private security takes precedence, and public actors only play a supervisory role. This article examines the boundary zone in multiple approaches, attempting to stipulate the red line between the two security elements.
Style APA, Harvard, Vancouver, ISO itp.
8

Matheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva i Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES". International Journal of Advanced Research 10, nr 11 (30.11.2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.

Pełny tekst źródła
Streszczenie:
Objective: Companies in the cybersecurity consulting market are expanding their services in periodic training to business stakeholders and enforcement of security policies. The objective of this work is to demonstrate the importance of consulting in information security policies aimed at small and medium-sized companies. Methods: It is characterized as a narrative literature review with a qualitative approach, which does not use explicit and systematic criteria for the search and critical analysis of the selected literature. Results: Tools needed for cybersecurity include endpoint detection and response (EDR), antivirus software, next-generation firewalls, Domain Name System (DNS) protection, email gateway security, intrusion detection and prevention, logging and log monitoring, endpoint protection, authentication and virtual private network (VPN) services, cloud-based security, web application firewalls (WAFs), software-defined wide area networks (SD-WAN), enterprise password management , privileged access management (GAP), vulnerability and threat management, and threat detection. Conclusions: In summary, SMBs seem to implement some of the basic cybersecurity measures only as part of their overall IT implementation. However, it appears that unless cybersecurity controls are included as part of an IT solution, many SMBs do not realize the resulting potential risks to their business.
Style APA, Harvard, Vancouver, ISO itp.
9

Kashmar, Nadine, Mehdi Adda i Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities". Journal of Cybersecurity and Privacy 2, nr 1 (14.02.2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.

Pełny tekst źródła
Streszczenie:
Access control (AC) policies are a set of rules administering decisions in systems and they are increasingly used for implementing flexible and adaptive systems to control access in today’s internet services, networks, security systems, and others. The emergence of the current generation of networking environments, with digital transformation, such as the internet of things (IoT), fog computing, cloud computing, etc., with their different applications, bring out new trends, concepts, and challenges to integrate more advanced and intelligent systems in critical and heterogeneous structures. This fact, in addition to the COVID-19 pandemic, has prompted a greater need than ever for AC due to widespread telework and the need to access resources and data related to critical domains such as government, healthcare, industry, and others, and any successful cyber or physical attack can disrupt operations or even decline critical services to society. Moreover, various declarations have announced that the world of AC is changing fast, and the pandemic made AC feel more essential than in the past. To minimize security risks of any unauthorized access to physical and logical systems, before and during the pandemic, several AC approaches are proposed to find a common specification for security policy where AC is implemented in various dynamic and heterogeneous computing environments. Unfortunately, the proposed AC models and metamodels have limited features and are insufficient to meet the current access control requirements. In this context, we have developed a Hierarchical, Extensible, Advanced, and Dynamic (HEAD) AC metamodel with substantial features that is able to encompass the heterogeneity of AC models, overcome the existing limitations of the proposed AC metamodels, and follow the various technology progressions. In this paper, we explain the distinct design of the HEAD metamodel, starting from the metamodel development phase and reaching to the policy enforcement phase. We describe the remaining steps and how they can be employed to develop more advanced features in order to open new opportunities and answer the various challenges of technology progressions and the impact of the pandemic in the domain. As a result, we present a novel approach in five main phases: metamodel development, deriving models, generating policies, policy analysis and assessment, and policy enforcement. This approach can be employed to assist security experts and system administrators to design secure systems that comply with the organizational security policies that are related to access control.
Style APA, Harvard, Vancouver, ISO itp.
10

Lysychkina, �., O. Lysychkina i Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT". Scientific journal of the National Academy of National Guard "Honor and Law" 2, nr 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.

Pełny tekst źródła
Streszczenie:
This article highlights the research results concerning the English-Ukrainian translation peculiarities of the NATO special terminology to denote the security and defense sector activities. This terminology is of special significance for the military terminological activity within the linguistic support as a relatively new domain of the troops� (forces�) support due to its special value for the National Guard of Ukraine in terms of establishing and maintaining its cross-cultural communication with the NATO allies and partners. The research was based on the English-Ukrainian and Ukrainian-English glossary "NATO Glossary of Defense and Security Policy Terms", developed under the DCAF in 2017. The choice of the equivalents for special terms to denote defence and security sector activities is grounded on the principles of concepts coherence, accuracy of wording, the term etymology, and the semantic content comparative analysis of the terminological units and their equivalents in Ukrainian and English. It has been defined that the terms functional identity in both languages allows preserving the nominative and systematic nature of the term. The typical translation methods for the analyzed terminological units have been identified (lexico-semantic shifts, loan translation, and explication), as well as the structural and compositional patterns of equivalents selection in the Ukrainian language. The majority (64,5 %) of the analyzed glossary terms are used to denote the activities of the National Guard of Ukraine. The research results underline the importance of military terminological activity of the National Guard of Ukraine in order to systematize the terminological system of this agency and, in a broader context, to better understand military and law enforcement activities of similar law enforcement agencies of other countries.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "SECURITY DOMAIN ENFORCEMENT"

1

Watts, Robert B. "Implementing maritime domain awareness". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FWatts.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Jeffrey Kline. "March 2006." Includes bibliographical references (p. 61-66). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
2

Jirka, Michal. "Aplikace pro zabezpečení Linuxového serveru pomocí technologie SELinux". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217612.

Pełny tekst źródła
Streszczenie:
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretionary and mandatory access control are compared and examine basic technologies based on mandatory access control. More closely is focused on project SELinux, whose generation of new rules is explained. Within the thesis is made application for logging evaluation and for writing new Type Enforcement rules.
Style APA, Harvard, Vancouver, ISO itp.
3

Oikonomidis, Nikolaos [Verfasser]. "Security Policy Enforcement for Collaborating eGovernment Domains / Nikolaos Oikonomidis". Aachen : Shaker, 2007. http://d-nb.info/1170527744/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

SINGH, HARPREET. "ROLE BASED ACCESS CONTROL WITH SELINUX". Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15485.

Pełny tekst źródła
Streszczenie:
In a typical healthcare information system, multiple users access data stored in different files related to patients. Healthcare organizations have to adhere to security regulations while storing sensitive data of patients and also providing access control to various users of the system, like doctor, administrators, nurses, pharmacists, pathologists etc. To provide secure access control, application layer security is already provided in the system to restrict access control for various users to classified information in Hospital Information System (HIS). Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer. But these measures, application layer security and DAC, becomes insufficient in case of virus/malware attacks. This thesis investigates about providing Hierarchical Role based access control (RBAC) using SELinux to provide security using checks provided by SELinux at OS layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer which can contain attack from compromised application and restrict access according to security policy implemented. The main contribution of this research is to provide a RBAC using SELinux to a typical Hospital Information System (HIS). The roles and the hierarchy have been defined for users in a typical HIS and security policy has been developed around this hierarchy to provide security to classified information in HIS to different roles. The feasibility of using SELinux profiles in HIS has been demonstrated through the creation of a prototype application, which was submitted to various attack scenarios. The prototype has also been subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios are based on vulnerabilities common at the application layer. SELinux demonstrates that it can effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. Access control is decided on the role played by different users in the organization. It is similar to concept of groups in linux. It categorizes the groups of users and group of permissions as compared to user groups which define user sets.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "SECURITY DOMAIN ENFORCEMENT"

1

Ganz, Aurora. Fuelling Insecurity. Policy Press, 2021. http://dx.doi.org/10.1332/policypress/9781529216691.001.0001.

Pełny tekst źródła
Streszczenie:
This book explores energy securitization in Azerbaijan through a sociological approach that combines discourse with a practice-oriented analysis. The study focuses on the national, international and private actors involved in the labour of energy security and their diverse sets of practices. Its empirical findings indicate that in Azerbaijan, energy securitization lacks the unitary and homogeneous character of its ideal type. Its heterogeneity interlaces internal security with external security, military with civil, defence with enforcement, coercion with control. It relies on surveillance and policing technologies as much as on maritime defence and counterterrorism; it intertwines the national and the international, as well as the public and the private domains of politics; it builds ties amidst manifold security actors and institutions that belong in different social universes; it merges security logic and neoliberal rationales and techniques. Energy securitisation encircles local dynamics and structures into patterns of international cooperation and corporate strategy. The rhetoric emphasis and the routinized character of energy security practices have trivialized any possible alternative and made invisible its costs. In particular, this book reflects on the multiple forms of abuse and violence and the poor energy choices tied to the processes of energy securitisation.
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "SECURITY DOMAIN ENFORCEMENT"

1

Tidswell, Jonathon, i John Potter. "An approach to dynamic domain and type enforcement". W Information Security and Privacy, 26–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027941.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Smine, Manel, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens i Marc-Oliver Pahl. "A Priority-Based Domain Type Enforcement for Exception Management". W Foundations and Practice of Security, 65–81. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70881-8_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tang, Liuying, i Sihan Qing. "A Practical Alternative to Domain and Type Enforcement Integrity Formal Models". W Information Security and Cryptology, 225–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11937807_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Tsudik, Gene. "Policy enforcement in stub autonomous domains". W Computer Security — ESORICS 92, 229–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/bfb0013901.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Douglas, Guilfoyle. "Part II Predominant Security Challenges and International Law, International Security, Ch.16 Maritime Security". W The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0017.

Pełny tekst źródła
Streszczenie:
This chapter discusses maritime security, reviewing relevant law of the sea concepts. The modern law of the sea encompasses both functional and zonal approaches: the question of the law applicable to any situation thus involves analysis of both the activity in question and where it is conducted. Several traditional law of the sea enforcement techniques are also being adapted to new challenges. Principal amongst these is the doctrine of port State jurisdiction. The chapter then surveys a number of challenges in the maritime domain. It looks at three major themes cutting across these various silos. The first is Maritime Domain Awareness; if the law of the sea regulates who may do what and where, then a challenge for enforcement is knowing who is doing what and where. The second theme is the turn to informality. Most new maritime security initiatives do not involve creating new organizations or legal instruments; responses to collective or regional challenges tend now to occur through informal coalitions. Finally, the broadening of maritime security brings a wider range of non-State or ‘grey zone’ actors into the picture, including migrants, seafarers, transnational criminals, and hybrid private/State actors such as the Chinese maritime militia.
Style APA, Harvard, Vancouver, ISO itp.
6

Ishii, Yurika. "Unconventional Lawmaking and International Cooperation on Illegal Bunkering at Sea". W Unconventional Lawmaking in the Law of the Sea, 76—C5.P46. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780192897824.003.0005.

Pełny tekst źródła
Streszczenie:
Abstract This chapter discusses the characteristics of unconventional lawmaking to regulate oil bunkering activities in the maritime domain beyond the territorial sea. Such activities adversely affect the fight against oil theft and smuggling, as well as harming the marine environment. Under the United Nations Convention on Law of the Sea, a non-flag state may not interfere with a ship unless it is within its authority, as allocated under the convention. At this stage, there is no international agreement that directly controls oil bunkering. Yet, there are international efforts to develop cooperation between law enforcement authorities to suppress those unlawful acts, where the coastal states may have jurisdictional basis. Such a move can be seen, for instance, in the Luanda Declaration on Maritime and Energy Security of 2015. This chapter will examine these latest state practices, and analyse their impact on the legal order at sea.
Style APA, Harvard, Vancouver, ISO itp.
7

Berhe, Solomon, Steven A. Demurjian, Jaime Pavlich-Mariscal, Rishi Kanth Saripalle i Alberto De la Rosa Algarín. "Leveraging UML for Access Control Engineering in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC". W Research Anthology on Recent Trends, Tools, and Implications of Computer Programming, 916–39. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3016-0.ch042.

Pełny tekst źródła
Streszczenie:
To facilitate collaboration in emerging domains such as the Patient-Centered Medical Home (PCMH), the authors' prior work extended the NIST Role-Based Access Control (RBAC) model to yield a formal Collaboration on Duty and Adaptive Workflow (CoD/AWF) model. The next logical step is to place this work into the context of an integrated software process for security engineering from design through enforcement. Towards this goal, the authors promote a secure software engineering process that leverages an extended Unified Modeling Language (UML) to visualize CoD/AWF policies to achieve a solution that separates concerns while still providing the means to securely engineer dynamic collaborations for applications such as the PCMH.
Style APA, Harvard, Vancouver, ISO itp.
8

Dobos, Ned. "Martial Values in Civilian Life". W Ethics, Security, and The War-Machine, 104–30. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198860518.003.0006.

Pełny tekst źródła
Streszczenie:
Wherever there is a professional military organization, certain values must be cultivated in and celebrated by it, in order for it to effectively deploy organized violence on behalf of the state. But when these values penetrate into civilian society—as they almost invariably do—there can be pernicious results. This chapter takes a sample of three civilian domains—law enforcement, business, and education—and draws attention to some of the adverse consequences that their cultural ‘militarization’ has had. This analysis suggests that when the values, ideals, and assumptions of the armed forces encroach into, and take root in, civilian institutions, the proper functioning (or telos) of those institutions can be compromised.
Style APA, Harvard, Vancouver, ISO itp.
9

Koukovini, Maria N., Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani i Iakovos S. Venieris. "Privacy Compliance Requirements in Workflow Environments". W Cyber Law, Privacy, and Security, 596–618. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch029.

Pełny tekst źródła
Streszczenie:
Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.
Style APA, Harvard, Vancouver, ISO itp.
10

Ciorciari, John D. "Sharing Sovereignty in the Streets". W Sovereignty Sharing in Fragile States, 134–60. Stanford University Press, 2021. http://dx.doi.org/10.11126/stanford/9781503613669.003.0007.

Pełny tekst źródła
Streszczenie:
This chapter examines international policing in fragile states. It discusses the aims and challenges of engaging external actors in core domestic law enforcement functions, drawing from the multiple cases in which external actors and local police have shared sovereign police powers. It then examines the case of joint policing in Timor-Leste, and shows how national and international interests converged during the 2006 security crisis that gripped the country, enabling international police to step into the breach and provide important security services. However, this case also shows how interests can diverge and dissipate as crises pass, and illustrates the added challenges of performing well and earning legitimacy in domains like policing, which depend heavily on local knowledge.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "SECURITY DOMAIN ENFORCEMENT"

1

Pradenas, Richard. "Directional enhancement in the frequency domain of fingerprint images". W Enabling Technologies for Law Enforcement and Security, redaktorzy Lisa A. Alyea i David E. Hoglund. SPIE, 1997. http://dx.doi.org/10.1117/12.265384.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Swamy, Nikhil, Michael Hicks i Simon Tsang. "Verified Enforcement of Security Policies for Cross-Domain Information Flows". W MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Donnelly, Justin, Jacob Madden, Alden Roberts, Matthew Greenberg, Jeffrey Bradshaw i Andrzej Uszok. "Dynamic policy enforcement in JBI information management services with the KAoS Policy and Domain Services". W Defense and Security Symposium, redaktor Raja Suresh. SPIE, 2007. http://dx.doi.org/10.1117/12.720702.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yuhan, Wang, Yuan Hongtao, Kong Weiwen, Yang Hankun i Zhang Huan. "Time Domain Analysis of Single Module Movement of Deep Sea Rights Enforcement Platform". W ASME 2020 39th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/omae2020-18528.

Pełny tekst źródła
Streszczenie:
Abstract Due to its large size, deep sea rights enforcement platform cannot be closed in the dock, so it needs to be dragged to the pre-installed position for module to module connection. Based on the ANSYS AQWA software, a single module finite element model of the platform is established to solve the security problem of the far-reaching maritime rights enforcement platform in the sea. The hydrodynamic coefficient and the transfer function of the motion response are calculated in the frequency domain, and the response spectrum analysis is carried out. It is worth noting that the single module is a trapezoidal asymmetric structure, so the shape influence on the calculation results will be focused on. The results show that the motion response of the single module is greatly influenced by the wave cycle and the wave direction, because the single module of the platform is a trapezoid asymmetric structure, and the hydrodynamic coefficients are different under different incident waves. Through comparison and parameter analysis, the rationality of the single module design and the good motion performance under the actual sea condition are verified.
Style APA, Harvard, Vancouver, ISO itp.
5

Tical, Georgemarius, i Georgica Panfil. "PLACE AND ROLE OF NATIONAL COLLEGE OF HOME AFAIRS WITHIN SPECIAL LEARNING ENVIRONMENTS". W eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-019.

Pełny tekst źródła
Streszczenie:
The paper presents the main characteristics and related issues to National College of Home Affairs, a leading institution in the field of continuous training on matters directly related to home affairs area. The presence of National College of Home Affairs - ranked as faculty and functioning under the subordination of Alexandru Ioan Cuza Police Academy - within Romanian educational environment is a definite necessity for all the personnel from the superior layers of management, law enforcement, administration and other target groups, providing the support and training required by the new realities generated by dynamics of risks and threats from European an global security area. The creation of the College itself was a challenge required by the realities, as well as by the existence of similar institutions in the field of Intelligence training and National Defense training. Beyond this aspect, National College of Home Affairs follows the tendencies of other European institutions, together with new threats and risks emerging from societal dynamics and realities. The implications of changes within European security climax are also affecting the basic needs for training in the area of home affairs. The conclusions are underlining the importance and the usefulness of this special learning environment - because of its specificity, sensitivity and complexity for the domain of Internal Affairs. The research methods used within the content of the article are mainly the case study (assessment of the institution itself), as well as transversal (present situation) / longitudinal (evolution and history) analysis, in order to identify the main characteristics and to provide a better understanding of the specificity of this type of institution characterized by unicity.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii