Case Studies in Personnel Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving operating systems security: two case studies

model of such TOCTTOU problems (called CUU –“C” stands for “Check” and “U” stands for “Use”) that captures all potential vulnerabilities. The model is based on

متن کامل

Case Studies: a Security Science Research Methodology

As a relatively new discipline Security Science is searching for academic acceptance very often combining established hard science approaches with those of Social Science and Humanities. Methodologies need to be developed to equip the discipline to conduct more varied research. One such method is the use of the case study approach, as it allows multiple inputs from a variety of sources to build...

متن کامل

Planning Attacks to Security Protocols: Case Studies in Logic Programming

Formal verification of security protocols has become a key issue in computer security. Yet, it has proven to be a hard task often error prone and discouraging for non-experts in formal methods. In this paper we show how security protocols can be specified and verified efficiently and effectively by embedding reasoning about actions into a logic programming language. In a nutshell, we view a pro...

متن کامل

Requirements for security in cooperative work: two case studies

The purpose of this work is to provide a source of information about requirements for security and protection in software to support cooperative work. This report should be read in conjunction with its companion report [1], which describes a security model for cooperative work derived in part from the case studies presented in this report. Our case studies take the form of definitions of the se...

متن کامل

Two Case Studies in Using Chatbots for Security Training

This paper discusses the result of two case studies performed in a large international company to test the use of chatbots for internal security training. The first study targeted 26 end users in the company while the second study examined 80 security specialists. From a quantitative analytical perspective there does not appears to be any significant findings when chatbots are used for security...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Harvard Law Review

سال: 1956

ISSN: 0017-811X

DOI: 10.2307/1337681