Добірка наукової літератури з теми "Security-oriented management"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security-oriented management".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Security-oriented management"

1

Yu, Zhi Wei, and Zhong Yuan Ji. "Study on Security Management-Oriented Business Process Model." Advanced Materials Research 267 (June 2011): 183–88. http://dx.doi.org/10.4028/www.scientific.net/amr.267.183.

Повний текст джерела
Анотація:
Information systems security is important for the day-to-day operations of business process. The current business process modeling can’t describe all the factors that the security management concerns on. A tri-layer business process model is presented in this paper from agent layer, activity layer and asset layer. This tri-layer model, which is based on business process and is convenient for security requirements analysis, expresses the relationship between activities, agents and assets. The essence that information systems are used to support the business process to fulfill the organizational functions is expressed in this tri-layer model. Such elements as assets, personnel, business activities the security management cares about are included in this model, which forms the basis and communication platform of security management. Finally, the pragmatic value of this tri-layer model is validated through a case of security management project of a manufacturing enterprise in China.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Niu, Qiu Na. "Distributed Group Key Management for Secure Electronic Communication." Applied Mechanics and Materials 385-386 (August 2013): 1591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1591.

Повний текст джерела
Анотація:
With the popularity of group-oriented applications, secure electronic communication among all group members has become a major issue. This paper proposes a distributed group-oriented key management scheme for secure electronic communication. The scheme deploys Elliptic Curve Diffie-Hellman (ECDH) which is more lightweight as compared to regular Diffie-Hellman. According to the security analysis, the proposed scheme provides a number of desirable security properties, including group key secrecy, forward secrecy and backward secrecy.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Momot, Tetiana, Olena Filonych, Antonina Kosiak, and Olena Lobach. "BALANCED SCORECARD OF SAFETY-ORIENTED MANAGEMENT FOR THE CONSTRUCTION INDUSTRY ENTERPRISES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (16) (July 6, 2021): 54–62. http://dx.doi.org/10.30837/itssi.2021.16.054.

Повний текст джерела
Анотація:
The article is devoted to the study of the theoretical and methodological foundations for the development of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry. The subject of the research is a set of theoretical, methodological and practical aspects to ensure the formation of the balanced scorecard development to ensure safe-oriented management of enterprises in the construction industry. The purpose of the article is to develop theoretical and methodological provisions and substantiate practical recommendations for the formation of a model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry, taking into account the interests of all groups of stakeholders. Objectives of the work: to analyze modern trends in the development of enterprises in the construction industry in Ukraine; to generalize approaches to the definition of the concept of safety-oriented management; explore and organize the elements of safety-oriented management; to develop a model of a balanced scorecard for ensuring safe-oriented management in the corporate security system of enterprises in the construction industry. In the course of the study, the following methods were used: abstract-logical analysis, theoretical generalization and systematization, system analysis. The paper analyzes the dynamics of the development of enterprises in the construction industry in Ukraine in the context of the introduction of quarantine measures related to COVID-19. Factors constraining construction activities have been identified, which include financial constraints, insufficient demand, labor shortage, and weather conditions. Approaches to the definition of security-oriented management have been generalized and the definition of security-oriented management in the corporate security system has been improved. The elements of safety-oriented management are systematized with the specification of such components as risk assessment, development and implementation of security policy, definition of requirements, establishment of control and monitoring of the external and internal environment. A model of a balanced scorecard for ensuring safe-oriented management of enterprises in the construction industry has been developed. Conclusions. In the course of the study, the expediency of forming a balanced system of indicators for ensuring safe-oriented management of enterprises in the construction industry was substantiated, taking into account the dynamics of the performance of construction work during 2019-2021. The elements of the system of safe-oriented management are presented in detail and the expediency of the formation of a balanced system of indicators for ensuring the safe-oriented management of enterprises in the construction industry is substantiated. The sequence of the formation of a balanced scorecard for ensuring safety-oriented management is detailed with the specification of a scorecard for assessing strategic goals for the components of a balanced scorecard: finance, customers, internal business processes, training and development.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gandotra, Vandana, Archana Singhal, and Punam Bedi. "Threat-Oriented Security Framework: A Proactive Approach in Threat Management." Procedia Technology 4 (2012): 487–94. http://dx.doi.org/10.1016/j.protcy.2012.05.078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Threat-oriented security framework in risk management using multiagent system." Software: Practice and Experience 43, no. 9 (June 7, 2012): 1013–38. http://dx.doi.org/10.1002/spe.2133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dudziak-Gajowiak, Dominika, Grzegorz Kolaczek, and Krzysztof Juszczyszyn. "Solving problems relating to ICT security management systems including various characteristics of the environment and system." Scientific Journal of the Military University of Land Forces 192, no. 2 (April 1, 2019): 321–34. http://dx.doi.org/10.5604/01.3001.0013.2607.

Повний текст джерела
Анотація:
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Primost, Stephen. "Applying Security within a Service-Oriented Architecture." Information Security Journal: A Global Perspective 17, no. 1 (March 24, 2008): 26–32. http://dx.doi.org/10.1080/19393550801929257.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.

Повний текст джерела
Анотація:
Assuring security and privacy is one of the key issues affecting the Internet of Things (IoT), mostly due to its distributed nature. Therefore, for the IoT to thrive, this problem needs to be tackled and solved. This paper describes a security-oriented architecture for managing IoT deployments. Our main goal was to deal with a fine-grained control in the access to IoT data and devices, to prevent devices from being manipulated by attackers and to avoid information leaking from IoT devices to unauthorized recipients. The access control is split: the management of authentication and access control policies is centered on special components (Authentication, Authorization, and Accounting Controllers), which can be distributed or centralized, and the actual enforcement of access control decisions happens on the entities that stay in the path to the IoT devices (Gateways and Device Drivers). The authentication in the entire system uses asymmetric cryptography and pre-distributed unique identifiers derived from public keys; no Public Key Infrastructure (PKI) is used. A Kerberos-like ticket-based approach is used to establish secure sessions.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cherevko, Oleksandr, Serhiy Nazarenko, Nataliia Zachosova, and Nataliia Nosan. "Financial and economic security system strategic management as an independent direction of management." SHS Web of Conferences 65 (2019): 03001. http://dx.doi.org/10.1051/shsconf/20196503001.

Повний текст джерела
Анотація:
The scientific views of domestic researchers regarding the definition of financial and economic security using the basics of the systematic approach are generalized. The author's vision on the definition of financial and economic security system is proposed. The main shortcomings of existing approaches to the process of formation of financial and economic security system as an object of management are revealed and systematized. The main defects and miscalculations in security management both – at the micro and macro levels are identified. The 16-component model of management of financial and economic security (PROM) was proposed. The conceptual foundations of security oriented strategic management are specified. Three strategies offered for achieving economic and financial security: Strategy for achieving financial and economic security on the basis of branding, image and reputation (BIR strategy), Strategy for achieving financial and economic security through partnerships with stakeholders and ensuring their interests (Strategy of PIS), Strategy for achieving the state of financial and economic security through the interconnection of experts, control and standardization (Strategy of ECS).
Стилі APA, Harvard, Vancouver, ISO та ін.
10

von Solms, S. H., and Isak van der Merwe. "The management of computer security profiles using a role-oriented approach." Computers & Security 13, no. 8 (January 1994): 673–80. http://dx.doi.org/10.1016/0167-4048(94)90049-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Security-oriented management"

1

Momot, T. V., I. O. Filatova, and D. T. Momot. "Customer relationship management in the system of stakeholders-oriented corporate security." Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/10138.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Skogsrud, Halvard Computer Science &amp Engineering Faculty of Engineering UNSW. "Trust negotiation policy management for service-oriented applications." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25723.

Повний текст джерела
Анотація:
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular technology to connect applications both within and across enterprise boundaries. However, as services are increasingly used to implement critical functionality, security has become an important concern impeding the widespread adoption of SOA. Trust negotiation is an approach to access control that may be applied in scenarios where service requesters are often unknown in advance, such as for services available via the public Internet. Rather than relying on requesters' identities, trust negotiation makes access decisions based on the level of trust established between the requester and the provider in a negotiation, during which the parties exchange credentials, which are signed assertions that describe some attributes of the owner. However, managing the evolution of trust negotiation policies is a difficult problem that has not been sufficiently addressed to date. Access control policies have a lifecycle, and they are revised based on applicable business policies. Additionally, because a trust relationship established in a trust negotiation may be long lasting, their evolution must also be managed. Simply allowing a negotiation to continue according to an old policy may be undesirable, especially if new important constraints have been added. In this thesis, we introduce a model-driven trust negotiation framework for service-oriented applications. The framework employs a model for trust negotiation, based on state machines, that allows automated generation of the control structures necessary to enforce trust negotiation policies from the visual model of the policy. Our policy model also supports lifecycle management. We provide sets of operations to modify policies and to manage ongoing negotiations, and operators for identifying and managing impacts of changes to trust negotiation policies on ongoing trust negotiations. The framework presented in the thesis has been implemented in the Trust-Serv prototype, which leverages industry specifications such as WS-Security and WS-Trust to offer a container-centric mechanism for deploying trust negotiation that is transparent to the services being protected.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Duma, Claudiu. "Security and Efficiency Tradeoffs in Multicast Group Key Management." Licentiate thesis, Linköping : Univ, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5695.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mouratidis, Haralambos. "A security oriented approach in the development of multiagent systems : applied to the management of the health and social care needs of older people in England." Thesis, University of Sheffield, 2004. http://etheses.whiterose.ac.uk/14864/.

Повний текст джерела
Анотація:
Security can play an important role in the development of some multi agent systems. However, a careful analysis of software development processes indicates that the definition of security requirements is, usually, considered after the design of the system. This approach, usually, leads to problems, such as conflicts between security and functional requirements, which can translate into security vulnerabilities. As a result, the integration of security issues in agent oriented software engineering methodologies has been identified as an important issue. Nevertheless, developers of agent oriented software engineering methodologies have mainly neglected security engineering and in fact very little evidence has been reported on work that integrates security issues into the development stages of agent oriented software engineering methodologies. This thesis advances the current state of the art In agent oriented software engineering in many ways. It identifies problems associated with the integration of security and software engineering and proposes a set of minimum requirements that a security oriented process should demonstrate. It extends the concepts and the development process of the Tropos methodology with respect to security to allow developers, even those with minimum security knowledge, to identify desired security requirements for their multi agent systems, reason about them, and as a result develop a system that satisfies its security requirements. In doing so, this research has developed (1) an analysis technique to enable developers to select amongst alternative architectural styles using as criteria the security requirements of the system, (2) a pattern language consisting of security patterns for multi agent systems, and (3) a scenario-based technique that allows developers to test the reaction of the system to potential attacks. The applicability of the approach is demonstrated by employing it in the development of the electronic single assessment process (eSAP) system, a real-life case study that provided the initial motivation for this research.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bou, Nassar Pascal. "Gestion de la sécurité dans une infrastructure de services dynamique : Une approche par gestion des risques." Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00828598.

Повний текст джерела
Анотація:
Les changements de contexte économiques imposent de nouvelles stratégies organisationnelles aux entreprises : recentrages métier et développement de stratégies de collaboration interentreprises. Ces tendances du marché laissent prévoir une croissance exponentielle d'écosystèmes de service accessibles à la fois aux clients finaux et aux partenaires. Tout laisse prévoir que ces écosystèmes s'appuieront largement sur les architectures orientées services permettant de construire des systèmes d'information capable d'avoir l'agilité requise et de supporter l'interconnexion des processus métier collaboratifs en composant dynamiquement les processus à partir de services distribués. Ce type d'architecture qui permet d'assurer l'alignement du système d'information sur les besoins métier de l'entreprise, rend indispensable la prise en compte des contraintes de sécurité tant au niveau individuel des services qu'au niveau de la composition. Dans un environnement de services distribués et dynamiques, la sécurité ne doit pas se limiter à fournir des solutions technologiques mais à trouver une stratégie de sécurité prenant en compte les dimensions métier, organisationnelle et technologique. En outre, la sécurité doit être appréhendée comme un processus continu qui vise l'optimisation des investissements de sécurité et assure la pérennité des mesures de sécurité mises en œuvre. Or les modèles et architectures de référence du domaine des services ont sous-estimé la définition des besoins en termes de sécurité, les biens à protéger et l'identification des risques pesant sur ces biens. Pour cela, nous proposons d'aborder la problématique de la sécurité par une approche de gestion des risques permettant d'identifier les différents types de risques et de proposer les mesures de sécurité les plus adéquates au contexte. Toutefois, la gestion des risques s'avère un vrai défi dans un environnement ouvert de services collaboratifs. En effet, les méthodes de gestion des risques développées dans le cadre des systèmes d'information ne répondent pas aux exigences de sécurité dans un environnement ouvert et ne sont pas adaptées aux environnements dynamiques. Pour pallier ces limites, nous proposons un cadre méthodologique de gestion de la sécurité portant sur les phases préparation, conception, exécution et supervision du cycle de vie des services. Nous proposons un modèle de services sécurisés permettant de définir des patrons de sécurité, un modèle de classification des biens à protéger et une ontologie pour définir les concepts associés à ces biens. En outre, nous développons une méthodologie de conception d'une architecture orientée services sécurisée puis abordons la construction de processus métier sécurisés avant de proposer un service de gestion des vulnérabilités de l'infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Eriksson, Maria. "WEB SERVICES FÖR MOBILAPPLIKATIONER : Utveckling av säkra RESTful web services för mobilapplikationer." Thesis, Örebro universitet, Akademin för naturvetenskap och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-15879.

Повний текст джерела
Анотація:
This report describes the development of a RESTful web service for mobile applications. The web service makes resources from an existing system called kompetensdatabasen ("the competence database") available. Kompetensdatabasen holds information about the capabilities of consultants and about assignments carried out at the IT consultant business Nethouse AB. The web service was developed according to the principles of REST and ROA (Resource Oriented Architecture) which puts focus on making resources available. The resources are made available through the HTTP protocol and the methods associated with it. This means it was designed to use the same technologies as the world wide web. Following these principles when designing the system has been of great importance. To make sure that the service does not leak information to competing companies or violate the Personal Data Act some kind of solution for securing the service had to be implemented. A model for authentication was produced to make the system accessible only for employees of the company.
Rapporten beskriver utvecklandet av en RESTful web service för mobilapplikationer. Web servicen tillgängliggör resurser från ett befintligt system som kallas kompetensdatabasen. Kompetensdatabasen innehåller information om konsulters kompetenser och de uppdrag som utförts vid IT-konsultföretaget Nethouse AB. Web servicen utvecklades enligt principerna för REST och ROA (Resource Oriented Architecture) vilket innebär ett fokus på att tillgängliggöra resurser. Resurserna görs nåbara genom HTTP-protokollet och dess metoder, det vill säga samma tekniker som används på webben. Stor vikt har lagts på att designa systemet enligt dessa principer. För att servicen inte skulle läcka information till konkurrenter eller bryta mot personuppgiftslagen behövde någon form av säkerhetslösning implementeras. En autentiseringsmodell togs fram för att göra systemet nåbart enbart för anställda vid företaget.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Fan, Yang, Hidehiko Masuhara, Tomoyuki Aotani, Flemming Nielson, and Hanne Riis Nielson. "AspectKE*: Security aspects with program analysis for distributed systems." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4136/.

Повний текст джерела
Анотація:
Enforcing security policies to distributed systems is difficult, in particular, when a system contains untrusted components. We designed AspectKE*, a distributed AOP language based on a tuple space, to tackle this issue. In AspectKE*, aspects can enforce access control policies that depend on future behavior of running processes. One of the key language features is the predicates and functions that extract results of static program analysis, which are useful for defining security aspects that have to know about future behavior of a program. AspectKE* also provides a novel variable binding mechanism for pointcuts, so that pointcuts can uniformly specify join points based on both static and dynamic information about the program. Our implementation strategy performs fundamental static analysis at load-time, so as to retain runtime overheads minimal. We implemented a compiler for AspectKE*, and demonstrate usefulness of AspectKE* through a security aspect for a distributed chat system.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tsai, Chiang-nan, and 蔡江楠. "Study on Architecture-Oriented Information Security Management Model." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/czrcgz.

Повний текст джерела
Анотація:
碩士
國立中山大學
資訊管理學系研究所
97
Information security, sometimes referred as enterprise security, plays a very important and professional role in the enterprises. Therefore, information security management is getting more and more popularity among the enterprises in recent years. Several aspects on information, such as technical documents, research and development plans, product quotations, are considered as core assets in one company. How to effectively manage and realize an information security system has become a key for a company’s survival. The international information security management standard, ISO 27001:2005, which includes personnel security, technology security, physical security and management security has been promulgated. When bringing in an information security management system, a company usually embraces the process-oriented approach which treats the system’s structure view and behavior view separately. Separating structure view from behavior view during the planning phase may cause many difficulties, such as uneven distribution of resources, poor safety performance, bad risk management, poor system management and so on, when working on the later realization and verification phase of the information security management system’s construction. Up to date, there is no enterprise architecture theory for information security management system. This research utilizes architecture-oriented modeling methodology so that structure view and behavior view are coalesced when decomposing the information security management system to obtain structural elements and behaviors deriving from interactions among these structure elements. By adopting structure behavior coalescence, abbreviated as SBC, which includes “architecture hierarchy diagram", "structure element diagram", "structure element service diagram", "structure element connection diagram", "structure behavior coalescence diagram", and "interactive flow diagram", this research constructs a complete architecture-oriented information security management model, abbreviated as AOISMM. This research is the first study using architecture-oriented approach to construct the information security management system. Also, AOISMM solves many difficulties caused by the process-oriented approach when constructing information security management systems. These are the contributions of this research.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lu, Woei-Yuan, and 呂瑋原. "Study on Architecture-Oriented Enterprise Security Management Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/57922753660149789660.

Повний текст джерела
Анотація:
碩士
國立中山大學
資訊管理學系研究所
103
Due to the trend of globalization, international trade, and a variety of business activities, companies must be able to provide timely, safely, and integrity information disclosure for interested party of enterprise . Therefore, the establishment of enterprise security management such as the International Organization for Standardization (ISO) becomes a key issue for any company to get involved in international trade. The main purpose of this research is to construct an architecture-oriented model for enterprise security management according to ISO 27001 : 2005 information security management system(ISMS)requirements. This model will combine the components and component operations of the department and software systems, in order to describe in detail about the interaction relationship and information flow of enterprise security management. In this thesis, we construct an architecture-oriented enterprise security management model (AOESMM) based on theory and methods of enterprise architecture. This model uses the structure-behavior coalescence approach with six fundamental diagrams: the “architecture hierarchy diagram,” the “framework diagram,” the “component operation diagram,” the “component connection diagram, the “structure-behavior coalescence diagram,” and the “interaction flow diagram”. AOESMM shall allow organizational structures, systems operations, and information flow, with a great deal of simple, clear, and easy communication features.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Lin, Jing-Han, and 林京漢. "Study on Architecture-Oriented Information Security Risk Management Model." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/hvqty6.

Повний текст джерела
Анотація:
碩士
正修科技大學
資訊管理研究所
103
In this study, we adopt the structure behavior coalescence methodology to construct an architecture-oriented information security risk management model (AOISRMM), which is integrated structure and behavior of the risk management model. AOISRMM solves many difficulties caused by the process-oriented approach in ISO 27001:2013 of information security risk assessment such as uneven distribution of resources, poor safety performance and high risk. We find out the vice president’s office, information security consultant, project manager and risk management system are the key roles for the success of the risk management from structure behavior coalescence diagram. The feedback mechanism in the enterprise is essential to report and respond to the incidents for reducing the risk. AOISRMM represents multiple views of information security risk management by integrating the structure and behavior of the risk management. We conclude that AOISRMM, being an integration model, enables enterprise organization, IT system, internal risk management processes to be a single interface to the vice president and department heads. The staffs can effectively understand the whole picture of information security risk management through AOISRMM, which shall clarify the duties for each unit and flexible sources allocation for the enterprise. Also AOISRMM have a good communication effect of organization and external environment.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Security-oriented management"

1

Lorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hsiao, David K. An object-oriented approach to security policies and their access controls for database management. Monterey, Calif: Naval Postgraduate School, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

de, Paula Everton G. Clustering, concurrency control, crash recovery, garbage collection, and security in object-oriented database management systems. Monterey, Calif: Naval Postgraduate School, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

1957-, Patel D., Sutherland Jeffrey Victor, and Miller J, eds. Business object design and implementation II: OOPSLA '96, OOPSLA '97, and OOPSLA '98 workshop proceedings. London: Springer, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

United States. Government Accountability Office. Results-oriented government: Practices that can help enhance and sustain collaboration among federal agencies : report to the Chairman, Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C: Govt. Accountability Office, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ernesto, Pimentel, Zavattaro Gianluigi, and SpringerLink (Online service), eds. Service-Oriented and Cloud Computing: First European Conference, ESOCC 2012, Bertinoro, Italy, September 19-21, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Malik, Zaki. Trust Management for Service-Oriented Environments. Boston, MA: Springer-Verlag US, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ernesto, Damiani, Maciaszek Leszek, Missikoff Michele, Parkin Michael, and SpringerLink (Online service), eds. Business System Management and Engineering: From Open Issues to Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

U.S. Department of Justice Community Oriented Policing Services Office: Hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, February 29, 2012. Washington: U.S. G.P.O., 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Bertino, Elisa, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Security-oriented management"

1

Cannady, James. "Security Models for Object-Oriented Databases." In Data Management, 283–91. 3rd ed. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9780429114878-28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Soomro, Inam, and Naved Ahmed. "Towards Security Risk-Oriented Misuse Cases." In Business Process Management Workshops, 689–700. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36285-9_68.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sowa, Sebastian, Lampros Tsinas, and Roland Gabriel. "BORIS –Business ORiented management of Information Security." In Managing Information Risk and the Economics of Security, 81–97. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09762-6_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Park, Wonjoo, Jaehoon Nah, and Sungwon Sohn. "A Study of Security Association Management Oriented to IP Security." In Information Networking: Wireless Communications Technologies and Network Applications, 381–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45801-8_37.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Stocker, Thomas, and Frank Böhr. "IF-Net: A Meta-Model for Security-Oriented Process Specification." In Security and Trust Management, 191–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Brossard, David, and Maurizio Colombo. "Common Capabilities for Trust and Security in Service Oriented Infrastructures." In Trust Management III, 310–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02056-8_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bertino, Elisa, Lorenzo D. Martino, Federica Paci, and Anna C. Squicciarini. "Digital Identity Management and Trust Negotiation." In Security for Web Services and Service-Oriented Architectures, 79–114. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-87742-4_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sabir Idrees, Muhammad, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira, Herve Grall, and Mario Südholt. "Evolving Security Requirements in Multi-layered Service-Oriented-Architectures." In Data Privacy Management and Autonomous Spontaneus Security, 190–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28879-1_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zemtsov, I., and L. Astakhova. "Object-Oriented Situational Approach to Enterprise Information Security Management." In Lecture Notes in Electrical Engineering, 591–600. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71119-1_58.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mouheb, D., C. Talhi, M. Nouh, V. Lima, M. Debbabi, L. Wang, and M. Pourzandi. "Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML." In Software Engineering Research, Management and Applications 2010, 197–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13273-5_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Security-oriented management"

1

Chen, Ke, Ying Wang, Peng Yu, and Naling Li. "Security-Oriented Network Slice Backup Method." In 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2021. http://dx.doi.org/10.23919/apnoms52696.2021.9562592.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Almorsy, Mohamed, John Grundy, and Amani S. Ibrahim. "TOSSMA: A Tenant-Oriented SaaS Security Management Architecture." In 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). IEEE, 2012. http://dx.doi.org/10.1109/cloud.2012.146.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ambhore, Premchand B., B. B. Meshram, and V. B. Waghmare. "A Implementation of Object Oriented Database Security." In 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007). IEEE, 2007. http://dx.doi.org/10.1109/sera.2007.17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Menzel, Michael, Ivonne Thomas, and Christoph Meinel. "Security Requirements Specification in Service-Oriented Business Process Management." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.90.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

"A RECONFIGURABLE SECURITY MANAGEMENT SYSTEM WITH SERVICE ORIENTED ARCHITECTURE." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001716903570362.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wang, Jiawei, Yuejun Zhang, Pengjun Wang, Zhicun Luan, Xiaoyong Xue, Xiaoyang Zeng, and Qiaoyan Yu. "An Orthogonal Algorithm for Key Management in Hardware Obfuscation." In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2019. http://dx.doi.org/10.1109/asianhost47458.2019.9006703.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Peng, Wang, Chen Yingwu, Chen Sen, and Ye Guoqing. "ISRMDSS: An information security risk management oriented multi-agent system." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6014739.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Abie, Habtamu. "Adaptive security and trust management for autonomic message-oriented middleware." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336915.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rizvi, Syed, Jungwoo Ryoo, John Kissell, and Bill Aiken. "A stakeholder-oriented assessment index for cloud security auditing." In IMCOM '15: The 9th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2701126.2701226.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Xu Lei. "Cyber-security analysis for process control oriented information system." In 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC). IEEE, 2011. http://dx.doi.org/10.1109/aimsec.2011.6010318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Security-oriented management"

1

De Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Повний текст джерела
Анотація:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії