Beyond the security paradox: Ten criteria for a socially informed security policy
نویسندگان
چکیده
منابع مشابه
Investigate the Quality of Social Security Organization Policy-Making on Social Security Pensioners Life Style Changes
This article has been done with aims to investigate impact of the quality of social security organization policy-making on pensioners' life style in that organization in the city of Mahabad and based on the criteria of environmental, Economic, Social, Political, Health, Personal security, life expectancy, housing and other services have been research case that are the most important factors tha...
متن کاملA Security Policy Configuration for the Security-Enhanced Linux
3 TE Configuration 3 3.1 Global Macros . . . . . . . . . . . . . . 3 3.1.1 Class and Permission Macros . . 3 3.1.2 Rule Macros . . . . . . . . . . . 4 3.2 Type Attributes . . . . . . . . . . . . . . 5 3.3 General Types . . . . . . . . . . . . . . . 6 3.3.1 Security Types . . . . . . . . . . 6 3.3.2 Device Types . . . . . . . . . . . 6 3.3.3 File Types . . . . . . . . . . . . . 7 3.3.4 Procfs Ty...
متن کاملThe Policy Machine for Security Policy Management
Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flow, Chinese Wall, Clark-Wilson, N-person Control, and DAC, in addition to more informal ad hoc policies. While each of these policies has a particular area of strength, the notational differences between these policies are subst...
متن کاملInformation Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. However, the managerial aspects of information security often remain challenging, especially in emerging technological contexts, and management executives lack an understanding o...
متن کاملOn the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction
In this paper, we study the security of randomized CBC– MACs and propose a new construction that resists birthday paradox attacks and provably reaches full security. The size of the MAC tags in this construction is optimal, i.e., exactly twice the size of the block cipher. Up to a constant, the security of the proposed randomized CBC– MAC using an n–bit block cipher is the same as the security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Public Understanding of Science
سال: 2017
ISSN: 0963-6625,1361-6609
DOI: 10.1177/0963662517702321