Academic literature on the topic 'Component Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Component Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Component Security"
Nikolenko, Tamara. "Investment security as a component of the state's economic security." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Ekonomìka 10, no. 20 (2020): 101–13. http://dx.doi.org/10.34079/2226-2822-2020-10-20-101-113.
Full textAlguliyev, Rasim M., Yadigar N. Imamverdiyev, Rasim Sh Mahmudov, and Ramiz M. Aliguliyev. "Information security as a national security component." Information Security Journal: A Global Perspective 30, no. 1 (July 20, 2020): 1–18. http://dx.doi.org/10.1080/19393555.2020.1795323.
Full textBlakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (June 14, 2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.
Full textCHEN, JINFU, YANSHENG LU, and HUANHUAN WANG. "COMPONENT SECURITY TESTING APPROACH BASED ON EXTENDED CHEMICAL ABSTRACT MACHINE." International Journal of Software Engineering and Knowledge Engineering 22, no. 01 (February 2012): 59–83. http://dx.doi.org/10.1142/s0218194012500039.
Full textChen, Jinfu, Yansheng Lu, Huanhuan Wang, and Chengying Mao. "A Quantitative Assessment Approach to COTS Component Security." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/165029.
Full textGOUSIOS, G., E. AIVALOGLOU, and S. GRITZALIS. "Distributed component architectures security issues." Computer Standards & Interfaces 27, no. 3 (March 2005): 269–84. http://dx.doi.org/10.1016/s0920-5489(04)00098-4.
Full textHwalla, Nahla, Sibelle El Labban, and Rachel A. Bahn. "Nutrition security is an integral component of food security." Frontiers in Life Science 9, no. 3 (July 2, 2016): 167–72. http://dx.doi.org/10.1080/21553769.2016.1209133.
Full textA. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (June 30, 2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.
Full textMatsui, Elena A., and Ekaterina V. Kryukova. "Energy security is an important component of national security." SHS Web of Conferences 110 (2021): 01049. http://dx.doi.org/10.1051/shsconf/202111001049.
Full textGrynko, Tatyana, and Anna Klymenko. "ENSURING THE ECONOMIC SECURITY OF ECONOMIC ENTITIES: A PERSONNEL COMPONENT." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 15(43) (December 19, 2019): 4–8. http://dx.doi.org/10.25264/2311-5149-2019-15(43)-4-8.
Full textDissertations / Theses on the topic "Component Security"
Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textThesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Bond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.
Full textThe Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed.
The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The result of the evaluation is quantitative data, which can be presented with varying degrees of detail, reflecting the needs of the evaluator.
The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The evaluation method is focusing on technological components and is based on, but not limited to, the Security Functional Requirements (SFR) of the Common Criteria.
Sohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.
Full textThesis Advisor(s): Rollins, John ; Wollman, Lauren. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Immigration, Integration, Radicalization, Identity, International, U.S. Citizenship and Immigration Services (USCIS), Citizenship and Immigration Canada Includes bibliographical references (p. 79-89). Also available in print.
Ben, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.
Full textThe security of information systems are paramount in today’s life, especially with the growth of complex and highly interconnected computer systems. For instance, bank systems have the obligation to guarantee the integrity and confidentiality of their costumers accounts. The electronic voting, auctions and commerce also needs confidentiality and integrity preservation.However, security verification and its distributed implementation are heavy processes in general, advanced security skills are required since both security configuration and coding distributed systems are complex and error-prone. With the diverse security attacks leaded by the Internet advent, how can we be sure that computer systems that we are building do satisfy the intended security property?The security property that we investigate in this thesis is the noninterference, which is a global property that tracks sensitive information in the entire system and ensures confidentiality and integrity. Non-interference is expressed by the requirement that no information about secret data is leaked through the observation of public data variation. Such definition is more subtle than a basic specification of legitimate access for sensitive information, allowing to exploit and detect malfunctioning and malicious programs intrusions for sensitive data (e.g, Trojan horse that sends confidential data to untrusted users). However as a global property, the noninterference is hard to verify and implement.To this end, we propose a model-based design flow that ensures the noninterference property in an application software from its high-level model leading to decentralized secure implementation. We present the secureBIP framework that is an extension for the component-based model with multyparty interactions for security. Non-interference is guaranteed using two practical manners: (1) we annotate the entire variables and ports of the model and then according to a defined set of sufficient syntactic constraints we check the satisfaction of the property, (2) we partially annotate the model way and then by extracting its compositional dependency graphswe apply a synthesis algorithm that computes the less restrictive secure configuration of the model if it exists.Once the information flow security is established and non-interference is established on an high-level model of the system, we follow a practical automated method to build a secure distributed implementation. A set of transformations are applied on the abstract model to progressively transform it into low-level distributed models and finally to distributed implementation, while preserving information flow security. Model transformations replace high-level coordination using multiparty interactions by protocols using asynchronous Send/Receive message-passing. The distributedimplementation is therefore proven ”secure-by-construction” that is, the final code conforms to the desired security policy. To show the usability of our method, we apply and experiment it on real case studies and examples from distinct application domains
Tran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.
Full textThesis advisor(s): LuQi; Shing, Mantak. "September 2000." Includes bibliographical references (p. 63-65). Also available in print.
Sousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.
Full textThere are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified the requirements for an integrated command and control (C2) system that is able to conduct full-spectrum operations in the cyberspace environment. The most notable of that research revolves around the development and experimentation with the prototype system known as Cyber Command, Control and Information Operations System (C3IOS). C3IOS provides for a loose confederation of the cooperating systems with interaction between systems going through C2 interfaces. In this thesis, the authors introduce into C3IOS a means to support the commander's ability to take measured responses to coercive actions in a timely manner, specifically to facilitate the interaction between experts in the law of information conflict and information warriors responding to a cyber attack. The authors' research results in a set of use cases and requirements for the C2 understanding, planning, and deciding activities involved in such a capability, using Schmitt's analysis as an example.
Tran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.
Full textDementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.
Full textThesis Advisor(s): Michael, James B. Second Reader: Wingfield, Thomas C. ; Sarkesain, John F. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Cyberspace, Cyberspace Defense, Network Defense, Distributed Systems, Command and Control, Battle Management, Information Assurance, Situational Awareness. Includes bibliographical references (p. 73-77). Also available in print.
Kukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.
Full textFör varje organisation är det nödvändigt att skydda information från olika säkerhetshot. Att ha en effektiv säkerhetshantering är avgörande för att kunna skydda informationen. Denna process är komplex och många krav måste tillfredsställas. Problemet som detta examensarbete avser att lösa handlar om hur införandet av en assuransprocess kommer påverka Försvarsmakten. Denna process måste följas för att en lösning eller produkt ska godkännas till en specifik komponents säkerhetsnivå. Frågeställningen besvaras i första hand av en marknadsundersökning om säkerhetshantering. Olika säkerhetshanteringsstrategier undersöktes och de bästa säkerhetslösningar valdes. Lösningarna jämfördes därefter med de assuranskrav som anges i Försvarsmaktens KSF V3.1 (Krav på IT säkerhetsförmågor hos IT – system) som är den dokumentation som anger kraven för IT säkerhetsfunktioner i ett IT system. Lösningen som uppfyllde de flesta kraven valdes och modifierades för att uppfylla samtliga kraven. Slutligen rekommenderades en komponent assuransprocess, vilken skulle kunna användas för att avgöra vilken lösning eller produkt som skulle kunna användas samt på vilket sätt det skulle kunna användas. Möjligheten att införa sådana krav i förvärvet av vilken produkt eller tjänst det än gäller förser Försvarsmakten med garantier för att alla produkter eller tjänster är godkända enligt särskilda säkringsnivåer på samma sätt och därmed försäkras det svenska samhället att förfaranden inom svenska väpnade krafter dokumenteras samt skyddar landet och dess medborgare.
Säkerhetshantering, informationssäkerhet, autentisering, auktorisering, styrning, riskhantering, följsamhet, användaradministration
Peterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.
Full textBackground: The network-centric defense requires a method for securing vast dynamic distributed information systems. Currently, there are no efficient methods for establishing the level of IT security in vast dynamic distributed information systems.
Purpose: The target of this thesis was to design a method, capable of determining the level of IT security of vast dynamic component-based distributed information systems.
Method: The work was carried out by first defining concepts of IT security and distributed information systems and by reviewing basic measurement and modeling theory. Thereafter, previous evaluation methods aimed at determining the level of IT security of distributed information systems were reviewed. Last, by using the theoretic foundation and the ideas from reviewed efforts, a new evaluation method, aimed at determining the level of IT security of vast dynamic component-based distributed information systems, was developed.
Results: This thesis outlines a new method, CAESAR, capable of predicting the security level in parts of, or an entire, component-based distributed information system. The CAESAR method consists of a modeling technique and an evaluation algorithm. In addition, a Microsoft Windows compliant software, ROME, which allows the user to easily model and evaluate distributed systems using the CAESAR method, is made available.
Books on the topic "Component Security"
Lembaga Studi Pertahanan dan Studi Strategis Indonesia. Reserve component bill. Jakarta, Indonesia: Lembaga Studi Pertahanan dan Studi Strategis Indonesia, 2010.
Find full textFood and Agriculture Organization of the United Nations. Emergency Operations and Rehabilitation Division. The FAO component of the 2011 consolidated appeals. Rome: Emergency Operations and Rehabilitation Division, Food and Agriculture Organization of the United Nations, 2010.
Find full textJoe, Hogler, Project Air Force (U.S.). Strategy and Doctrine Program, and Rand Corporation, eds. Understanding country planning: A guide for Air Force component planners. Santa Monica, California: Rand Corporation, 2012.
Find full textACM, Policy '98 (1998 Washington D. C. ). Proceedings of the ethics and social impact component: ACM Policy '98 : shaping policy in the information age, May 10, 1998, Washington, D.C. USA. New York, NY: Association for Computing Machinery, 1998.
Find full textOffice, General Accounting. Overstay tracking: A key component of homeland security and a layered defense : report to the Chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: GAO, 2004.
Find full textWindows registry forensics: Advanced digital forensic analysis of the Windows registry. Burlington, MA: Syngress, 2011.
Find full textKingsbury, Nancy R. Homeland security: Overstay tracking is a key component of a layered defense : statement of Nancy R. Kingsbury, managing director, Applied Research and Methods : testimony before the Subcommittee on Immigration, Border Security, and Claims, Committee on the Judiciary, House of Representatives. [Washington, D.C.]: U.S. General Accounting Office, 2003.
Find full textUnited States. Congress. House. Committee on National Security. Military Personnel Subcommittee. Reserve component issues from the quadrennial defense review: Hearing before the Military Personnel Subcommittee of the Committee on National Security, House of Representatives, One Hundred Fifth Congress, first session, hearing held July 29, 1997. Washington: U.S. G.P.O., 1998.
Find full textOffice, General Accounting. Nuclear weapons: Capabilities of DOE's limited life component program to meet operational needs : report to the Committee on Armed Services, U.S. Senate. Washington, D.C: The Office, 1997.
Find full textCombating terrorism: Training and equipping reserve component forces : hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, May 11, 2004. Washington: U.S. G.P.O., 2004.
Find full textBook chapters on the topic "Component Security"
Moon, Chang-Joo, and Hoh Peter In. "Inconsistency Detection of Authorization Policies in Distributed Component Environment." In Information Security Applications, 39–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_4.
Full textDamiani, E., S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. "XML Access Control Systems: A Component-Based Approach." In Data and Application Security, 39–50. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/0-306-47008-x_4.
Full textZhang, Su, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, and Jing Jin. "Assessing Attack Surface with Component-Based Package Dependency." In Network and System Security, 405–17. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_29.
Full textAl Ali, Rima, Tomas Bures, Petr Hnetynka, Filip Krijt, Frantisek Plasil, and Jiri Vinarek. "Dynamic Security Specification Through Autonomic Component Ensembles." In Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, 172–85. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03424-5_12.
Full textYu, Dongjin, Ying Li, Yi Zhou, and Zhaohui Wu. "Security and Performance in Network Component Architecture." In Computational Science – ICCS 2006, 1055–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_171.
Full textPedro, Emilio San, Ionuț Riza, Anca Bandoi, and Camelia-Maria Olari Perju. "Information Security: Component of Corporate Social Responsibility." In Essential Issues in Corporate Social Responsibility, 85–100. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39229-1_7.
Full textLee, Kyoung-Mi. "Component-Based Online Learning for Face Detection and Verification." In Computational Intelligence and Security, 832–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596981_121.
Full textMa, Jinwen, Fei Ge, and Dengpan Gao. "Two Adaptive Matching Learning Algorithms for Independent Component Analysis." In Computational Intelligence and Security, 915–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_136.
Full textLanotte, Ruggero, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, and Enrico Tronci. "Automatic Covert Channel Analysis of a Multilevel Secure Component." In Information and Communications Security, 249–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30191-2_20.
Full textChu, Cheng-Kang, and Wen-Guey Tzeng. "Distributed Key Generation as a Component of an Integrated Protocol." In Information and Communications Security, 411–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36159-6_35.
Full textConference papers on the topic "Component Security"
Dixit, Anurag. "Intra-component security certification." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523251.
Full textWu, Liping, Jun Hu, Bo Yang, Qing Shao, and Gang Peng. "A new acceleration switch based on separated mass component and elastic component." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864916.
Full textHsu, Charles, and Harold Szu. "Sequential principal component analysis." In SPIE Defense, Security, and Sensing, edited by Harold Szu. SPIE, 2011. http://dx.doi.org/10.1117/12.887509.
Full textСидорина, Татьяна, Tat'yana Sidorina, Ксения Крамаренко, and Tat'yana Sidorina. "THE FINANCIAL COMPONENT OF ECONOMIC SECURITY OF ENTERPRISE." In Topical issues of ensuring economic security in the Russian Federation in the digital economy. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/2286.
Full textDyrda, Michal, Maciej Malawski, Marian Bubak, and Syed Naqvi. "Providing security for MOCCA component environment." In Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161082.
Full textFadhel, Nawfal F., Richard M. Crowder, Fatimah Akeel, and Gary B. Wills. "Component for 3D printing provenance framework: Security properties components for provenance framework." In 2014 World Congress on Internet Security (WorldCIS). IEEE, 2014. http://dx.doi.org/10.1109/worldcis.2014.7028174.
Full textJokanovic, Branka, Moeness Amin, Fauzia Ahmad, and Boualem Boashash. "Radar fall detection using principal component analysis." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2225106.
Full textVarney, Nina M., and Vijayan K. Asari. "Volume component analysis for classification of LiDAR data." In SPIE Defense + Security, edited by David Casasent and Mohammad S. Alam. SPIE, 2015. http://dx.doi.org/10.1117/12.2179268.
Full textIllig, David W., William D. Jemison, and Linda J. Mullen. "Independent component analysis for underwater lidar clutter rejection." In SPIE Defense + Security, edited by Weilin W. Hou and Robert A. Arnone. SPIE, 2016. http://dx.doi.org/10.1117/12.2222817.
Full textMasarik, Matthew P., Joseph Burns, Brian T. Thelen, Jack Kelly, and Timothy C. Havens. "GPR anomaly detection with robust principal component analysis." In SPIE Defense + Security, edited by Steven S. Bishop and Jason C. Isaacs. SPIE, 2015. http://dx.doi.org/10.1117/12.2176571.
Full textReports on the topic "Component Security"
Turke, Andy. Development and Demonstration of a Security Core Component. Office of Scientific and Technical Information (OSTI), February 2014. http://dx.doi.org/10.2172/1162156.
Full textSmith, Jeffrey A. United States Border Security and Reserve Component Forces. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada469373.
Full textKacsur, Charles J., and Jr. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada420059.
Full textRivera, Asdrubal. Total Force Component: A Transformed Army Reserve for the 21st Century Security Environment. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada448797.
Full textDavis, T. G. Assessing the Effects of Bush Administration National Security Policy, on the Air Force Active/Reserve Component Mix. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada424524.
Full textCorral, Leonardo, and Giulia Zane. Chimborazo Rural Investment Project: Rural Roads Component Impact Evaluation. Inter-American Development Bank, January 2021. http://dx.doi.org/10.18235/0003046.
Full textKhan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.
Full textMurdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/20200057.
Full textEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, April 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Full textFranusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), March 2016. http://dx.doi.org/10.2172/1242462.
Full text