A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment
نویسندگان
چکیده
منابع مشابه
Integrated Management of Security Policies
The design of an integrated approach for security management represents a difficult challenge, but the requirements of modern information systems make extremely urgent to dedicate research efforts in this direction. Three perspectives for integration can be identified. 1 Challenges to Security Policy Management The management of security policies is well known to be a hard problem. Significant ...
متن کاملControlling security policies in a distributed environment
This paper presents a type system to control the migration of codebetween nodes in a concurrent distributed framework, using Dπ. Weexpress resource policies with types and enforce them via a type sys-tem. Sites are organised hierarchically in subnetworks that share thesame security policies, statically specified by a network administrator.The type system guarantees that,...
متن کاملIntegrated Learning Environment for Smart Grid Security
Cyber Security of smart grids becomes more and more important to our everyday life for its wide implication in power systems, a critical infrastructure in a modern society. Many universities and corporations have put efforts in this field. However, there has been lack of emphasis on educational front of this important area. We believe that simulation systems designed for research purposes in th...
متن کاملA Comparison of Methods for Implementing Adaptive Security Policies
The security policies for computing resources must match the security policies of the organizations that use them; therefore, computer security policies must be adaptive to meet the changing security environment of their user-base. This paper presents four methods for implementing adaptive security policies for architectures which separate the de nition of the policy in a Security Server from t...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information and Communication Engineering
سال: 2014
ISSN: 2234-4772
DOI: 10.6109/jkiice.2014.18.3.617