A Policy-oriented Approach to Energy Security
نویسندگان
چکیده
منابع مشابه
Model-Driven Security Policy Deployment: Property Oriented Approach
We focus in this paper on the issue of formally validating the deployment of access control security policies. Our proposal is the following. First, as input to our approach, we consider a formal expression of the security requirements related to a given system; this ensures the deployment of an anomaly free abstract security policy. Second, we develop the algorithms using a theorem proving app...
متن کاملGender-Oriented Education: A New Approach to Gender Equity
The twentieth century can be considered the century of gender approaches. From extremist and one-sided movements to moderate and neutral schools of thought about gender, which have surrounded the last century and all of them had originated in achieving gender justice, but each has taken a different approach as a different definition of equity. The curriculum is no exception to this rule. The pu...
متن کاملturkey energy security policy and its role on energy transportation to europe
turkey as a country located between the main energy resources and the european :union: can play the role of a natural bridge in energy transportation. the eu countries have always tried to find some alternative routes for russian energy pipelines and turkey could be one of the best options. although turkey is poor in oil and natural gas resources, however, this country can play a strategic role...
متن کاملIndependent Policy Oriented Layering of Security Services
Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applic...
متن کاملDynamic Aspect-Oriented Security Policy Enforcement
There are many approaches to utilizing aspect-oriented (AO) languages and techniques for the purpose of introducing security into applications. The cross-cutting nature of security has been well documented and therefore the benefit of implementing security using AO techniques logically follows. Authentication, authorization, auditing, logging, etc. are obvious activities that can easily be intr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Environmental Sciences
سال: 2015
ISSN: 1878-0296
DOI: 10.1016/j.proenv.2015.07.005