نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

2015
S. Geetha Prasanna Venkatesan

The vision of Pervasive Computing is that every device we communicate today has become a part of everyday objects, augmented with information services. Though there are a number of frameworks is been developed for security of smart systems, there is still space for research in the field of security of these systems. User privacy and Trust needs more concentration in a pervasive environment. Con...

Journal: :IJICS 2013
Lawrence Teo Gail-Joon Ahn

Security policy management is critical to meet organisational needs and reduce potential risks because almost every organisation depends on computer networks and the internet for their daily operations. It is therefore important to specify and enforce security policies effectively. However, as organisations grow, so do their networks – this increases the difficulty of deploying a security polic...

2015
Antonio Maña

In this chapter the authors present a policy-based security engineering process for service oriented applications, developed in the SERENITY and MISTICO projects. Security and dependability (S&D) are considered as first-class citizens in the proposed engineering process, which is based on the precise description of reusable security and dependability solutions. The authors’ process is based on ...

Journal: :caspian journal of internal medicine 0
alireza heidarian management of social security in mazandaran, ghaemshahr, iran seyed ebrahim jafari-kelarijani management of social security in mazandaran, ghaemshahr, iran reza jamshidi management of social security in mazandaran, ghaemshahr, iran mohammad khorshidi management of social security in mazandaran, ghaemshahr, iran

background: health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. the purpose of this study was to determine the factors affecting this motivation. methods: from winter 2013 to spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were ...

2006
Jordan Shropshire Merrill Warkentin Allen C. Johnston Mark B. Schmidt

Despite numerous advances in IT security, many computer users are still vulnerable to security-related risks because they do not comply with organizational policies and procedures. In a network setting, individual risk can extend to all networked users. Endpoint security refers to the set of organizational policies, procedures, and practices directed at securing the endpoint of the network conn...

2017
Nikos Vasilakis Ben Karel Nick Roessler Nathan Dautenhahn André DeHon Jonathan M. Smith

Developers of large-scale software systems may use third-party modules to reduce costs and accelerate release cycles, at some risk to safety and security. BREAKAPP exploits module boundaries to automate compartmentalization of systems and enforce security policies, enhancing reliability and security. BREAKAPP transparently spawns modules in protected compartments while preserving their original...

2013
Devrim ÜNAL Mehmet Ufuk ÇAĞLAYAN

For the formal verification of security in mobile networks, a requirement is that security policies associated with mobility and location constraints are formally specified and verified. For the formal specification and verification of security policies, formal methods ensure that a given network configuration that includes certain network elements satisfies a given security policy. A process c...

2004
Scott D. Stoller Yanhong A. Liu

As organizations grow larger and more complex, and as cybersecurity becomes an increasingly important concern, there are growing needs for languages that can express complex security policies of organizations and for efficient mechanisms to enforce the policies. An essential function of security policies is to control authorization, that is, to determine whether a request to access a resource s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

2008
Nikhil Swamy

Title of dissertation: Language-based Enforcement of User-defined Security Policies As Applied to Multi-tier Web Programs Nikhil Swamy, Doctor of Philosophy, 2008 Directed by: Professor Michael Hicks Department of Computer Science Over the last 35 years, researchers have proposed many different forms of security policies to control how information is managed by software, e.g., multi-level infor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید