Results 251 to 260 of about 2,449,057 (299)
Some of the next articles are maybe not open access.

Security policy

Computers & Security, 1990
We frequently hear a lot about the need for security, indeed there are now security products on the market to more than protect most systems whether they be on mainframe, mini or microcomputer systems. While each of these products is usually designed to carry out a specific task, the way in which these controls are introduced is of prime importance as ...
openaire   +1 more source

Security policy update

Computers & Security, 2002
This article reviews the recent spate of public policy initiatives which will impact on an organization's approach towards the security of its data.
openaire   +1 more source

On the buzzword 'security policy'

Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 2002
It is pointed out that, although the term 'security policy' is fundamental to computer security, its conflicting meanings have obscured important conceptual distinctions, especially where concerns other than confidentiality are involved. A clearer definition is needed to clarify routine technical discourse, facilitate resolution of key research issues,
openaire   +1 more source

Interactive simulation of security policies

Proceedings of the 2002 ACM symposium on Applied computing, 2002
A general framework for simulating security policies interactively is developed by ASMs (Gurevich's Abstract State Machines) and then mechanised by the ASM Workbench. The ASM external functions make it possible to simulate under the environmental influence the behaviour of a policy.
openaire   +2 more sources

Policy-based secure deletion

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013
Securely deleting data from storage systems has become difficult today. Most storage space is provided as a virtual resource and traverses many layers between the user and the actual physical storage medium. Operations to properly erase data and wipe out all its traces are typically not foreseen, particularly not in networked and cloud-storage systems.
Christian Cachin   +3 more
openaire   +2 more sources

The Security Policy

1991
The major components of a balanced security programme are: existence of a comprehensive security policy; development and implementation of detailed security procedures; a method of monitoring compliance with, and the results of, such procedures.
openaire   +1 more source

Security policies

2002
Ross J. Anderson   +2 more
openaire   +1 more source

Security and Policy

2013
Asking users to upload important documents and information content to SharePoint without providing a level of security to protect their data is like driving without a seatbelt. Users like to know that their data is secure when they are asked to move it from their work machines to shared servers and collaborative platforms, like SharePoint.
openaire   +1 more source

VPN Security Policy

Information Security Technical Report, 2001
openaire   +1 more source

Home - About - Disclaimer - Privacy