نتایج جستجو برای: proposed policies

تعداد نتایج: 894066  

2010
Tite Tuyikeze Dalenca Pottas

Despite the fact that the formulation and use of information security policies are commonly practiced and that organizations devote significant resources to information security management, it is commonplace that the application of a security policy fails to accomplish its goals. For example, policies may be issued but not reviewed to include new regulatory requirements or business process chan...

2006
Kuong-Ho Chen Yuan-Siao Liu Tzong-Jye Liu Chyi-Ren Dow

IPSec/VPN management is a complicated challenge, since IPSec functions correctly only if its security policies satisfy all administrated requirements. Computer-generated security policies tend to conflict with each other, which would causes network congestion or creates security vulnerability. Thus conflict resolving has become an issue. In this paper, a method to automatically generate policie...

2017
Eunsoo Kim Kuyju Kim Seungjin Lee Hyoungshick Kim

Network Functions Virtualization (NFV) and Software Defined Networking (SDN) make it easier for security administrators to manage security policies on a network system. However, it is still challenging to map high-level security policies defined by users into low-level security policies that can be applied to network security devices. To address this problem, we introduce a framework for effect...

2016
Prosunjit Biswas Ravi S. Sandhu Ram Krishnan

There has been considerable research in specifying authorization policies for XML documents. Most of these approaches consider only hierarchical structure of underlying data. They define authorization policies by directly identifying XML nodes in the policies. These approaches work well for hierarchical structure but are not suitable for other required characteristics we identify in this paper ...

2004
Emir Toktar Edgard Jamhour Carlos Maziero

This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XACML, the general purpose access control language proposed by OASIS. Because RSVP is a specific application domain, it is not directly supported by the XACML standard. Hence, this work defines the XACML extensions requir...

Journal: :مدیریت فرهنگ سازمانی 0
احمد رضا قاسمی . استادیار، پردیس فارابی دانشگاه تهران، ایران قاسم فرج پور خانا پشتانی استادیار، دانشگاه آزاد اسلامی، واحد پرند، تهران، ایران پریسا رضا یزدی دانشجوی کارشناسی ارشد، دانشگاه آزاد اسلامی، واحد پرند، تهران، ایران

supply chain management is one of modern approach in the field of operation and production management. nowadays success and survival of manufacturing organizations depend on effectiveness and productivity of supply chains. this research tries to investigate contributing factor to enhance supply chain productivity. then by using fuzzy promethe-a multiple attribute decision making (madm) - tous a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید