Results 11 to 20 of about 2,449,057 (299)

On Security Policy Migrations [PDF]

open access: yesProceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Jorge Lobo 0001   +2 more
openaire   +1 more source

On Quantitative Security Policies [PDF]

open access: yes, 2011
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO   +2 more
openaire   +2 more sources

Adaptive Security Policies [PDF]

open access: yes, 2020
We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be assured, that it will not be able to observe any violation of its own security policy due to the changing presence of other agents in its ...
Flemming Nielson   +2 more
openaire   +2 more sources

Distributed security policy conformance [PDF]

open access: yesComputers & Security, 2011
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Mirko Montanari   +4 more
openaire   +3 more sources

Re-imagining the Borders of US Security after 9/11: Securitisation, Risk, and the Creation of the Department of Homeland Security [PDF]

open access: yes, 2007
The articulation of international and transnational terrorism as a key issue in US security policy, as a result of the 9/11 attacks, has not only led to a policy rethink, it has also included a bureaucratic shift within the US, showing a re-thinking of ...
Agamben G.   +32 more
core   +1 more source

Prevention of an Arms Race in Outer Space: Multilateral Negotiations’ Effects on International Law

open access: yesМосковский журнал международного права, 2020
INTRODUCTION. Outer space is an increasingly competitive environment. This raises incentives for states to place conventional weapons in outer space.
T Vestner
doaj   +1 more source

Dynamic deployment of context-aware access control policies for constrained security devices [PDF]

open access: yes, 2009
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic   +4 more
core   +1 more source

Sensitivity studies on a novel nuclear forensics methodology for source reactor-type discrimination of separated weapons grade plutonium

open access: yesNuclear Engineering and Technology, 2019
A recently published nuclear forensics methodology for source discrimination of separated weapons-grade plutonium utilizes intra-element isotope ratios and a maximum likelihood formulation to identify the most likely source reactor-type, fuel burnup and ...
Evans D. Kitcher   +2 more
doaj   +1 more source

Can a Soldier Say No to an Enhancing Intervention?

open access: yesPhilosophies, 2020
Technological advancements have provided militaries with the possibility to enhance human performance and to provide soldiers with better warfighting capabilities. Though these technologies hold significant potential, their use is not without cost to the
Sahar Latheef, Adam Henschke
doaj   +1 more source

The European Union's 'Comprehensive Approach' in Chad: securitisation and/or compartmentalisation? [PDF]

open access: yes, 2015
The European Union (EU) aims for a comprehensive approach to security in developing countries. As a result, attempts have been made to enhance the nexus between the EU's security policy and other policy areas, particularly development, humanitarian ...
Del Biondo, Karen, Orbie, Jan
core   +1 more source

Home - About - Disclaimer - Privacy