نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

China is a vast and overpopulated country in the eastern Asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. By the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. Thus, they have put all their concentration on th...

2017
Eunsoo Kim Kuyju Kim Seungjin Lee Hyoungshick Kim

Network Functions Virtualization (NFV) and Software Defined Networking (SDN) make it easier for security administrators to manage security policies on a network system. However, it is still challenging to map high-level security policies defined by users into low-level security policies that can be applied to network security devices. To address this problem, we introduce a framework for effect...

1999
Carlos Ribeiro André Zúquete Paulo Ferreira Paulo Guedes

Most organizations use several security policies to control different systems and data, comprising in this way a global complex policy. These security policies are often scattered over different environments, each one with its own security model and domain of administration, making them difficult to administer and understand. Moreover, some applications (e.g. workflow), often need to cross seve...

1998
Frédéric Cuppens Laurence Cholvy Claire Saurel Jérôme Carrère

It often happens that organizations or companies have to respect several security policies simultaneously. Here, we analyze a practical example which applies to the context of documents containing sensitive information. This example considers the problem of downgrading the classification of these documents when their contents become obsolete. There are several security policies that deal with t...

This study analyzes the effect of Aggregate Measurement of supportive policies on Urban Households’ Food Security Index in Iran by applying Auto Regressive Distributed Lag (ARDL) for the period 1982 – 2012. In order to achieve this goal, Aggregate Households’ Food Security Index (AHFSI), Aggregate Measurement of Support (AMS), Inflation Rate and virtual variables for the targeted subsidy law pe...

2015
Yanhuang Li Nora Cuppens-Boulahia Jean-Michel Crom Frédéric Cuppens Vincent Frey Xiaoshu Ji

The interaction between different applications and services requires expressing their security properties. This is typically defined as security policies, which aim at specifying the diverse privileges of different actors. Today similarity measure for comparing security policies becomes a crucial technique in a variety of scenarios, such as finding the cloud service providers which satisfy clie...

1995
Claudia Eckert

The issue of developing complex secure systems is still a great challenge. We claim that in contrast to the well known bottom-up oriented approaches secure concurrent systems should be developed top-down starting with a formal top-level speciication. A framework for developing secure systems is needed, which ooers means to specify security requirements adapted to the speciic demands of applicat...

2001
Zhi Fu Shyhtsun Felix Wu He Huang Kung Loh Fengmin Gong Ilia Baldine Chong Xu

IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...

2005
Graeme Pye Matthew J. Warren

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-busines...

2000
Zhi Fu S. Felix Wu He Huang Kung Loh Fengmin Gong Ilia Baldine Chong Xu

IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید