A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrated Management of Security Policies

The design of an integrated approach for security management represents a difficult challenge, but the requirements of modern information systems make extremely urgent to dedicate research efforts in this direction. Three perspectives for integration can be identified. 1 Challenges to Security Policy Management The management of security policies is well known to be a hard problem. Significant ...

متن کامل

Controlling security policies in a distributed environment

This paper presents a type system to control the migration of codebetween nodes in a concurrent distributed framework, using Dπ. Weexpress resource policies with types and enforce them via a type sys-tem. Sites are organised hierarchically in subnetworks that share thesame security policies, statically specified by a network administrator.The type system guarantees that,...

متن کامل

Integrated Learning Environment for Smart Grid Security

Cyber Security of smart grids becomes more and more important to our everyday life for its wide implication in power systems, a critical infrastructure in a modern society. Many universities and corporations have put efforts in this field. However, there has been lack of emphasis on educational front of this important area. We believe that simulation systems designed for research purposes in th...

متن کامل

A Comparison of Methods for Implementing Adaptive Security Policies

The security policies for computing resources must match the security policies of the organizations that use them; therefore, computer security policies must be adaptive to meet the changing security environment of their user-base. This paper presents four methods for implementing adaptive security policies for architectures which separate the de nition of the policy in a Security Server from t...

متن کامل

Gender Analysis of Social Security Policies in Post- Revolutionary Iran

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information and Communication Engineering

سال: 2014

ISSN: 2234-4772

DOI: 10.6109/jkiice.2014.18.3.617