Security Aspects in EU External Policies
نویسندگان
چکیده
منابع مشابه
Aspects with Program Analysis for Security Policies
Enforcing security policies to IT systems, especially for a mobile distributed system , is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases, small modification of the security requirement might lead to substantial changes in a number of modu...
متن کاملModelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the ...
متن کاملEU External Trade Policy
The external trade policy of the EU impinges on nearly one fifth of world trade. Hence, an understanding of the principles and practice of the Union's trade policy, the Common Commercial Policy (CCP), is of vital importance to any student of the global trade environment. Ongoing research on the CCP has addressed both broad themes and detailed aspects of the Union's trade policy provides insight...
متن کاملPolicies and Security Aspects For Distributed Scientific Laboratories
Web Services and the Grid allow distributed research teams to form dynamic, multi-institutional virtual organizations sharing high performance computing resources, large scale data sets and instruments for solving computationally intensive scientific applications, thereby forming Virtual Laboratories. This paper aims at exploring security issues of such distributed scientific laboratories and t...
متن کاملTowards Automatic Integration of Or-BAC Security Policies Using Aspects
We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a set of Or-BAC security rules, our method derives corresponding AspectJ aspects. Derived aspects modify the behaviour of the underlying program so as to meet the policy. Then, these aspects are weaved into the target ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2009
ISSN: 1556-5068
DOI: 10.2139/ssrn.1367532