Network-centric policy design

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network and Data Policy Considerations for Effective Network Centric Operations

The US military is undertaking an unprecedented transformation as a result of its adoption of a network centric operational philosophy. This transformation maximizes the military’s reliance upon data superiority and decision superiority, but we have yet to develop the doctrine, systems, and data insights needed to fully exploit the physical capabilities for communication being developed. To red...

متن کامل

Network Performance Centric Security Design in MANET

Security is a basic requirement for mobile ad hoc networks. Several recent papers [4, 1, 2] have started to address security issues in such networks. While these early proposals each have their own merit, they mainly focus on the security vigor of the design and leave the network performance aspect largely unaddressed. As a result, these solutions may be extremely secure from the cryptographic ...

متن کامل

Interconnect-Centric SoC Design for Network-on-Chip

The system-on-chip (SoC) design paradigm and deep submicron (DSM) technology bring two main challenges to the ASIC design community. The first one is productivity to use millions of gates within ever shorter time-to-market, which is currently tackled with the design methodology based on Intellectual Property Right (IPR) blocks. The second challenge is coping with rapidly changed technology para...

متن کامل

Research Issues in Network-centric Computer-aided Design

Computer-Aided Design (CAD) users and software vendors are quickly recognizing the potential of the Internet. This has produced a tremendous investment in new Internet technologies for connecting distributed tools and users, such as the World Wide Web (WWW), plug-ins, and Java as enabling mechanisms for next-generation systems. Deploying next-generation tools incorporating these technologies wi...

متن کامل

Network-Centric Access Control

Information leakage via the networks formed by subjects and objects often leads to unpredicted risks in access control decisions, and needs to be quantified and addressed in an explicit manner. This paper presents a novel networkcentric access control paradigm that enhances traditional nodecentric models by explicitly accounting for such network effects in information flows, and yet offering sc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Policy Sciences

سال: 2017

ISSN: 0032-2687,1573-0891

DOI: 10.1007/s11077-016-9270-0