Results 11 to 20 of about 2,449,057 (299)
On Security Policy Migrations [PDF]
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Jorge Lobo 0001 +2 more
openaire +1 more source
On Quantitative Security Policies [PDF]
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO +2 more
openaire +2 more sources
Adaptive Security Policies [PDF]
We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be assured, that it will not be able to observe any violation of its own security policy due to the changing presence of other agents in its ...
Flemming Nielson +2 more
openaire +2 more sources
Distributed security policy conformance [PDF]
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Mirko Montanari +4 more
openaire +3 more sources
Re-imagining the Borders of US Security after 9/11: Securitisation, Risk, and the Creation of the Department of Homeland Security [PDF]
The articulation of international and transnational terrorism as a key issue in US security policy, as a result of the 9/11 attacks, has not only led to a policy rethink, it has also included a bureaucratic shift within the US, showing a re-thinking of ...
Agamben G. +32 more
core +1 more source
Prevention of an Arms Race in Outer Space: Multilateral Negotiations’ Effects on International Law
INTRODUCTION. Outer space is an increasingly competitive environment. This raises incentives for states to place conventional weapons in outer space.
T Vestner
doaj +1 more source
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic +4 more
core +1 more source
A recently published nuclear forensics methodology for source discrimination of separated weapons-grade plutonium utilizes intra-element isotope ratios and a maximum likelihood formulation to identify the most likely source reactor-type, fuel burnup and ...
Evans D. Kitcher +2 more
doaj +1 more source
Can a Soldier Say No to an Enhancing Intervention?
Technological advancements have provided militaries with the possibility to enhance human performance and to provide soldiers with better warfighting capabilities. Though these technologies hold significant potential, their use is not without cost to the
Sahar Latheef, Adam Henschke
doaj +1 more source
The European Union's 'Comprehensive Approach' in Chad: securitisation and/or compartmentalisation? [PDF]
The European Union (EU) aims for a comprehensive approach to security in developing countries. As a result, attempts have been made to enhance the nexus between the EU's security policy and other policy areas, particularly development, humanitarian ...
Del Biondo, Karen, Orbie, Jan
core +1 more source

