Buscar
Mostrando ítems 1-10 de 9706
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...
Security and defence policy documents: a new dataset
(2021)
Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This ...
Information Security Policy Compliance: Usefulness and Ease of Use
(Springer Link, 2023)
Various information security (IS) standards and frameworks have been proposed with the objective of safeguarding an organization’s information assets. The Information Security Policy (ISP) is one of the tools for managing ...
Crafting public security: Demilitarisation, penal state reform and security policy-making in post-authoritarian Chile
(Taylor & Francis, 2018-05)
Here I dissect the institutionalisation of ‘citizen security’ as a category and sector of public policy in post-authoritarian Chile. Deploying a Bourdieusian field theory approach and questioning narratives of security ...
Scalable model-based configuration management of security services in complex enterprise networks
(WILEY-BLACKWELL, 2011)
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes ...
Bridges to prosperity: food security, the environment, and peace for Central America
(CIATSDCCIPCIMMYT, 2012)
FORTUNA-A framework for the design and development of hardware-based secure systems
(Elsevier Science IncNew YorkEUA, 2013)
Security strategy for vulnerabilities prevention in the development of web applications
(IOP Publishing, 2019)
In recent years, Higher Education Institutions through their Systems departments have
strengthened security for the development of applications on web environment, because of their
vulnerability to possible computer ...