Beyond the security paradox: Ten criteria for a socially informed security policy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigate the Quality of Social Security Organization Policy-Making on Social Security Pensioners Life Style Changes

This article has been done with aims to investigate impact of the quality of social security organization policy-making on pensioners' life style in that organization in the city of Mahabad and based on the criteria of environmental, Economic, Social, Political, Health, Personal security, life expectancy, housing and other services have been research case that are the most important factors tha...

متن کامل

A Security Policy Configuration for the Security-Enhanced Linux

3 TE Configuration 3 3.1 Global Macros . . . . . . . . . . . . . . 3 3.1.1 Class and Permission Macros . . 3 3.1.2 Rule Macros . . . . . . . . . . . 4 3.2 Type Attributes . . . . . . . . . . . . . . 5 3.3 General Types . . . . . . . . . . . . . . . 6 3.3.1 Security Types . . . . . . . . . . 6 3.3.2 Device Types . . . . . . . . . . . 6 3.3.3 File Types . . . . . . . . . . . . . 7 3.3.4 Procfs Ty...

متن کامل

The Policy Machine for Security Policy Management

Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flow, Chinese Wall, Clark-Wilson, N-person Control, and DAC, in addition to more informal ad hoc policies. While each of these policies has a particular area of strength, the notational differences between these policies are subst...

متن کامل

Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI

The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. However, the managerial aspects of information security often remain challenging, especially in emerging technological contexts, and management executives lack an understanding o...

متن کامل

On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction

In this paper, we study the security of randomized CBC– MACs and propose a new construction that resists birthday paradox attacks and provably reaches full security. The size of the MAC tags in this construction is optimal, i.e., exactly twice the size of the block cipher. Up to a constant, the security of the proposed randomized CBC– MAC using an n–bit block cipher is the same as the security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Public Understanding of Science

سال: 2017

ISSN: 0963-6625,1361-6609

DOI: 10.1177/0963662517702321