نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

1995
Winfried E. Kühnhauser

One of today's major challenges in computer security is the ever-increasing multitude of individual, application-speciic security requirements. As a positive consequence , a wide variety of security policies has been developed , each policy reeecting the speciic needs of individual applications. As a negative consequence, the integration of the multitude of policies into today's system platform...

Journal: :IJICS 2012
Vimalathithan Subramanian Remzi Seker Srini Ramaswamy R. B. Lenin

Information system security policies have grown in complexity and the emerging collaborative nature of business has created new challenges in creating and managing such policies. These policies address several domains ranging from access control to disaster recovery and depend not only on the business itself but on socio-political/legal requirements as well. Events like collaborative work or pr...

Journal: :CoRR 2012
Fan Yang Chris Hankin Flemming Nielson Hanne Riis Nielson

We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies policies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use o...

Journal: :CoRR 2017
Ruan de Clercq Ingrid Verbauwhede

Control Flow Integrity (CFI) is a computer security technique that detects runtime attacks by monitoring a program’s branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many a...

Journal: :Inf. Comput. 2008
Chamseddine Talhi Nadia Tawbi Mourad Debbabi

Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is the characterization of security policies that are enforceable by execution monitors constrained by memory limitations. This paper contributes to give more precise answers to this research problem. To represent executi...

Journal: :مطالعات حقوق خصوصی 0
محسن ایزانلو

the article examines the relationship between tort damages for personal injury and social security benefits in iranian law with a comparative view on english and french law. amongst four potential policies (cumulation, reduction, election and recoupment), the statutory provisions of iranian law have chosen the latter one. but in practice these texts have paradoxically lead to a fifth excessive ...

Journal: :international journal of political science 0

china is a vast and overpopulated country in the eastern asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. by the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. thus, they have put all their concentration on th...

2006
Mikko T. Siponen Seppo Pahnila Mo Adam Mahmood

The literature agrees that the major threat to IS security is constituted by careless employees. Therefore, effective IS security requires that users are not only aware of, but also comply with organizations’ IS security policies and procedures. To address this important concern, different IS security awareness, education and enforcement approaches have been proposed. Prior research on IS secur...

1999
Patrick D. McDaniel Atul Prakash Peter Honeyman

Many emerging applications on the Internet requiring group communication have varying security requirements. Significant strides have been made in achieving strong semantics and security guarantees within group environments. However, in existing solutions, the scope of available security policies is often limited. This paper presents Antigone, a framework that provides a suite of mechanisms fro...

2008
Luay A. Wahsheh

Although security plays a major role in the design of software systems, security requirements and policies are usually added to an already existing system, not created in conjunction with the product. As a result, there are often numerous problems with the overall design. In this paper, we discuss the relationship between software engineering, security engineering, and policy engineering and pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید