Academic literature on the topic 'Component Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Component Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Component Security"

1

Nikolenko, Tamara. "Investment security as a component of the state's economic security." Vìsnik Marìupolʹsʹkogo deržavnogo unìversitetu. Serìâ: Ekonomìka 10, no. 20 (2020): 101–13. http://dx.doi.org/10.34079/2226-2822-2020-10-20-101-113.

Full text
Abstract:
The article is devoted to the study of the peculiarities of investment security of the country as a component of economic security, and the development of general recommendations for improving its level. In particular, the dynamics of foreign direct investment of Ukraine is studied and forecasted, the geographical structure of foreign direct investment of Ukraine is assessed, the most attractive types of economic activity in the economy of Ukraine are considered, the dynamics of main macroeconomic investment security indicators is analyzed, namely fixed capital investment investment growth to GDP growth rates, estimated dynamics of the country's investment attractiveness index and highlighted the factors that affect it, indicated what threats foreign investments may pose to national economic security and suggested ways to minimize them.
APA, Harvard, Vancouver, ISO, and other styles
2

Alguliyev, Rasim M., Yadigar N. Imamverdiyev, Rasim Sh Mahmudov, and Ramiz M. Aliguliyev. "Information security as a national security component." Information Security Journal: A Global Perspective 30, no. 1 (July 20, 2020): 1–18. http://dx.doi.org/10.1080/19393555.2020.1795323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (June 14, 2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.

Full text
Abstract:
The article deals with problems of economic and financial security ensuring both in companies and state. The Corruption Perceptions Index has been analyzed as one of the most important indicators in this sphere. The following research methods have been used: generalizing theoretical knowledge, comparison method, method of analysis and synthesis, statistical analysis, factual analysis. The authors give their own definitions to such concepts as “security”, “financial security of the enterprise”, “economic security of the enterprise”. There have been also systemized the threats to the economic security of the enterprise, as well as means of its strengthening. The rating of Ukraine according to the Corruption Perceptions Index has been identified. Also, the perspectives of future research have been defined.
APA, Harvard, Vancouver, ISO, and other styles
4

CHEN, JINFU, YANSHENG LU, and HUANHUAN WANG. "COMPONENT SECURITY TESTING APPROACH BASED ON EXTENDED CHEMICAL ABSTRACT MACHINE." International Journal of Software Engineering and Knowledge Engineering 22, no. 01 (February 2012): 59–83. http://dx.doi.org/10.1142/s0218194012500039.

Full text
Abstract:
Unreliable component security hinders the development of component technology. Component security testing is rarely researched with comprehensive focus; several approaches or technologies for detecting vulnerabilities in component security have been proposed, but most are infeasible. A testing approach for component security, which is based on the chemical abstract machine, is proposed for detecting explicit and implicit component security vulnerabilities. We develop an extended chemical abstract machine model, called eCHAM, and generate a state transfer tree and testing sequence for components based on the proposed model. The model can help test the explicit security exceptions of components according to the testing approach of interface fault injection. Condition and state mutation algorithms for identifying implicit security exceptions are also proposed. Vulnerability testing reports are obtained according to the test results. Experiments were conducted in an integration testing platform to verify the applicability of the proposed approach. Results show that the approach is effective and practicable. The proposed approach can detect explicit and implicit security exceptions of components.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jinfu, Yansheng Lu, Huanhuan Wang, and Chengying Mao. "A Quantitative Assessment Approach to COTS Component Security." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/165029.

Full text
Abstract:
The vulnerability of software components hinders the development of component technology. An effective assessment approach to component security level can promote the development of component technology. Thus, the current paper proposes a quantitative assessment approach to COTS (commercial-off-the-shelf) component security. The steps of interface fault injection and the assessment framework are given based on the internal factors of the tested component. The quantitative assessment algorithm and formula of component security level are also presented. The experiment results show that the approach not only can detect component security vulnerabilities effectively but also quantitatively assess the component security level. The score of component security can be accurately calculated, which represents the security level of the tested component.
APA, Harvard, Vancouver, ISO, and other styles
6

GOUSIOS, G., E. AIVALOGLOU, and S. GRITZALIS. "Distributed component architectures security issues." Computer Standards & Interfaces 27, no. 3 (March 2005): 269–84. http://dx.doi.org/10.1016/s0920-5489(04)00098-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hwalla, Nahla, Sibelle El Labban, and Rachel A. Bahn. "Nutrition security is an integral component of food security." Frontiers in Life Science 9, no. 3 (July 2, 2016): 167–72. http://dx.doi.org/10.1080/21553769.2016.1209133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

A. Manakhova. "Corporate Security as a Component of Russia's National Security." International Affairs 66, no. 003 (June 30, 2020): 146–52. http://dx.doi.org/10.21557/iaf.60072925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Matsui, Elena A., and Ekaterina V. Kryukova. "Energy security is an important component of national security." SHS Web of Conferences 110 (2021): 01049. http://dx.doi.org/10.1051/shsconf/202111001049.

Full text
Abstract:
The article deals with the issues of energy security as an important component of the national security of the country. There is growing uncertainty about safe access to reliable energy supplies at reasonable prices.
APA, Harvard, Vancouver, ISO, and other styles
10

Grynko, Tatyana, and Anna Klymenko. "ENSURING THE ECONOMIC SECURITY OF ECONOMIC ENTITIES: A PERSONNEL COMPONENT." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 15(43) (December 19, 2019): 4–8. http://dx.doi.org/10.25264/2311-5149-2019-15(43)-4-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Component Security"

1

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Bond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.

Full text
Abstract:

The Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed.

The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The result of the evaluation is quantitative data, which can be presented with varying degrees of detail, reflecting the needs of the evaluator.

The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The evaluation method is focusing on technological components and is based on, but not limited to, the Security Functional Requirements (SFR) of the Common Criteria.

APA, Harvard, Vancouver, ISO, and other styles
3

Sohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Rollins, John ; Wollman, Lauren. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Immigration, Integration, Radicalization, Identity, International, U.S. Citizenship and Immigration Services (USCIS), Citizenship and Immigration Canada Includes bibliographical references (p. 79-89). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Ben, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.

Full text
Abstract:
La sécurité des systèmes d'information sont primordiales dans la vie d'aujourd'hui, en particulier avec la croissance des systèmes informatiques complexes et fortement interconnectés. Par exemple, les systèmes bancaires ont l'obligation de garantir l'intégrité et la confidentialité de leurs comptes clients. Le vote électronique, des ventes aux enchères et le commerce doit aussi assurer leurs la confidentialité et l'intégrité.Cependant, la vérification de la sécurité et sa mise en œuvre en distribuée sont des processus lourds en général, les compétences de sécurité avancées sont nécessaires puisque les deux configuration de sécurité et l'implementation de systèmes distribué sont complexes et sujette d'erreurs. Avec les attaques de sécurité divers menés par l'environnement Internet, comment pouvons-nous être sûrs que les systèmes informatiques que nous construisons ne satisfont la propriété de sécurité prévu?La propriété de la sécurité que nous étudions dans cette thèse est la non-ingérence, qui est une propriété globale qui permet de suivre les informations sensibles dans l'ensemble du système et de garantir la confidentialité et l'intégrité. La non-ingérence est exprimée par l'exigence selon laquelle aucune information sur des données secrètes est une fuite à travers l'observation de la variation des données publiques. Cette définition est plus subtile qu'une spécification de base de l'accès légitime pour les informations sensibles, ce qui permet d'exploiter et de détecter les dysfonctionnements et malveillants programmes intrusions pour les données sensibles (par exemple, un cheval de Troie qui envoie des données confidentielles aux utilisateurs non fiables). Cependant, comme une propriété globale, la non-interférence est difficile à vérifier et à mettre en œuvre.À cette fin, nous proposons un flux de conception basée sur un modèle qui assure la propriété non-interference dans un logiciel d'application de son modèle de haut niveau conduisant à la mise en œuvre sécurisée décentralisée. Nous présentons la plateforme secureBIP, qui est une extension pour le modèle à base de composants avec des interactions multi-partie pour la sécurité. La non-interference est garantie à l'aide de deux manières pratiques: (1) nous annotons les variables et les ports du modèle, puis selon un ensemble défini de contraintes syntaxiques suffisantes, nous vérifions la satisfaction de la propriété, (2), nous annotons partiellement le modèle, puis en extrayant ses graphes de dépendances de composition nous appliquons un algorithme de synthèse qui calcule la configuration sécurisée moins restrictive du modèle si elle existe.Une fois que la sécurité des flux d'information est établie et la non-interference est établie sur un modèle de haut niveau du système, nous suivons une méthode automatisée pratique pour construire une application distribuée sécurisée. Un ensemble de transformations sont appliquées sur le modèle abstrait de transformer progressivement en bas niveau des modèles distribués et enfin à la mise en œuvre distribuée, tout en préservant la sécurité des flux d'information. La transformations du modèles remplacent coordination de haut niveau en utilisant des interactions multi-partites par des protocoles en utilisant des envoies et reception de messages asynchrone. La distribution est donc prouvé "sécuriser par construction" qui est, le code final est conforme à la politique de sécurité souhaitée. Pour montrer la facilité d'utilisation de notre méthode, nous appliquons et d'expérimenter sur des études et des exemples de cas réels de domaines d'application distincts
The security of information systems are paramount in today’s life, especially with the growth of complex and highly interconnected computer systems. For instance, bank systems have the obligation to guarantee the integrity and confidentiality of their costumers accounts. The electronic voting, auctions and commerce also needs confidentiality and integrity preservation.However, security verification and its distributed implementation are heavy processes in general, advanced security skills are required since both security configuration and coding distributed systems are complex and error-prone. With the diverse security attacks leaded by the Internet advent, how can we be sure that computer systems that we are building do satisfy the intended security property?The security property that we investigate in this thesis is the noninterference, which is a global property that tracks sensitive information in the entire system and ensures confidentiality and integrity. Non-interference is expressed by the requirement that no information about secret data is leaked through the observation of public data variation. Such definition is more subtle than a basic specification of legitimate access for sensitive information, allowing to exploit and detect malfunctioning and malicious programs intrusions for sensitive data (e.g, Trojan horse that sends confidential data to untrusted users). However as a global property, the noninterference is hard to verify and implement.To this end, we propose a model-based design flow that ensures the noninterference property in an application software from its high-level model leading to decentralized secure implementation. We present the secureBIP framework that is an extension for the component-based model with multyparty interactions for security. Non-interference is guaranteed using two practical manners: (1) we annotate the entire variables and ports of the model and then according to a defined set of sufficient syntactic constraints we check the satisfaction of the property, (2) we partially annotate the model way and then by extracting its compositional dependency graphswe apply a synthesis algorithm that computes the less restrictive secure configuration of the model if it exists.Once the information flow security is established and non-interference is established on an high-level model of the system, we follow a practical automated method to build a secure distributed implementation. A set of transformations are applied on the abstract model to progressively transform it into low-level distributed models and finally to distributed implementation, while preserving information flow security. Model transformations replace high-level coordination using multiparty interactions by protocols using asynchronous Send/Receive message-passing. The distributedimplementation is therefore proven ”secure-by-construction” that is, the final code conforms to the desired security policy. To show the usability of our method, we apply and experiment it on real case studies and examples from distinct application domains
APA, Harvard, Vancouver, ISO, and other styles
5

Tran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.

Full text
Abstract:
Thesis (M.S. in Software Engineering) Naval Postgraduate School, Sept. 2000.
Thesis advisor(s): LuQi; Shing, Mantak. "September 2000." Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Sousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.

Full text
Abstract:
Approved for public release; distribution is unlimited
There are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified the requirements for an integrated command and control (C2) system that is able to conduct full-spectrum operations in the cyberspace environment. The most notable of that research revolves around the development and experimentation with the prototype system known as Cyber Command, Control and Information Operations System (C3IOS). C3IOS provides for a loose confederation of the cooperating systems with interaction between systems going through C2 interfaces. In this thesis, the authors introduce into C3IOS a means to support the commander's ability to take measured responses to coercive actions in a timely manner, specifically to facilitate the interaction between experts in the law of information conflict and information warriors responding to a cyber attack. The authors' research results in a set of use cases and requirements for the C2 understanding, planning, and deciding activities involved in such a capability, using Schmitt's analysis as an example.
APA, Harvard, Vancouver, ISO, and other styles
7

Tran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.

Full text
Abstract:
There is a need for Commercial-off-the-shelf (COTS), Government-off- the-shelf (GOTS) and legacy components to interoperate in a secure distributed computing environment in order to facilitate the development of evolving applications. This thesis researches existing open standards solutions to the distributed component integration problem and proposes an application framework that supports application wrappers and a uniform security policy external to the components. This application framework adopts an Object Request Broker (ORB) standard based on Microsoft Distributed Component Object Model (DCOM). Application wrapper architectures are used to make components conform to the ORB standard. The application framework is shown to operate in a common network architecture. A portion of the Naval Integrated Tactical Environmental System I (NITES I) is used as a case study to demonstrate the utility of this distributed component integration methodology (DCIM).
APA, Harvard, Vancouver, ISO, and other styles
8

Dementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Michael, James B. Second Reader: Wingfield, Thomas C. ; Sarkesain, John F. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Cyberspace, Cyberspace Defense, Network Defense, Distributed Systems, Command and Control, Battle Management, Information Assurance, Situational Awareness. Includes bibliographical references (p. 73-77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Kukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Full text
Abstract:
Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. The problem that this master’s thesis project addressed was to propose a component assurance process for the Swedish Armed Forces. This process has to be followed in order for a solution or product to be approved at a specific component assurance level. This problem was solved by first performing market research regarding security management. Various security management approaches were examined and the top security management solutions were selected. These solutions were then compared with the assurance requirements stated in Swedish Armed Forces’ KSF v3.1 (Swedish: “Krav på IT-säkerhetsförmågor hos IT-system”, English: Requirements for IT security capabilities of IT systems). This documentation lists the requirements for information technology (IT) security capabilities of IT systems. The solution that satisfied the most of these requirements was selected and modified in order to satisfy the full set of requirements. Finally, a component assurance process is proposed. This process may be used to decide which solutions or products can be used, along with the manner in which each solution or product should be used. The impact of having a component assurance process is that all the solutions and products are approved to a specific component assurance level exclusively based on this process. The ability to include such requirements in the acquisition of any product or service provides the Swedish Armed Forces with assurance that all products or services are approved to specific assurance levels in the same manner and hence provides the Swedish society with assurance that procedures within the Swedish Armed Forces are documented and protect the interests of the country and its citizens.
För varje organisation är det nödvändigt att skydda information från olika säkerhetshot. Att ha en effektiv säkerhetshantering är avgörande för att kunna skydda informationen. Denna process är komplex och många krav måste tillfredsställas. Problemet som detta examensarbete avser att lösa handlar om hur införandet av en assuransprocess kommer påverka Försvarsmakten. Denna process måste följas för att en lösning eller produkt ska godkännas till en specifik komponents säkerhetsnivå. Frågeställningen besvaras i första hand av en marknadsundersökning om säkerhetshantering. Olika säkerhetshanteringsstrategier undersöktes och de bästa säkerhetslösningar valdes. Lösningarna jämfördes därefter med de assuranskrav som anges i Försvarsmaktens KSF V3.1 (Krav på IT säkerhetsförmågor hos IT – system) som är den dokumentation som anger kraven för IT säkerhetsfunktioner i ett IT system. Lösningen som uppfyllde de flesta kraven valdes och modifierades för att uppfylla samtliga kraven. Slutligen rekommenderades en komponent assuransprocess, vilken skulle kunna användas för att avgöra vilken lösning eller produkt som skulle kunna användas samt på vilket sätt det skulle kunna användas. Möjligheten att införa sådana krav i förvärvet av vilken produkt eller tjänst det än gäller förser Försvarsmakten med garantier för att alla produkter eller tjänster är godkända enligt särskilda säkringsnivåer på samma sätt och därmed försäkras det svenska samhället att förfaranden inom svenska väpnade krafter dokumenteras samt skyddar landet och dess medborgare.
Säkerhetshantering, informationssäkerhet, autentisering, auktorisering, styrning, riskhantering, följsamhet, användaradministration
APA, Harvard, Vancouver, ISO, and other styles
10

Peterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.

Full text
Abstract:

Background: The network-centric defense requires a method for securing vast dynamic distributed information systems. Currently, there are no efficient methods for establishing the level of IT security in vast dynamic distributed information systems.

Purpose: The target of this thesis was to design a method, capable of determining the level of IT security of vast dynamic component-based distributed information systems.

Method: The work was carried out by first defining concepts of IT security and distributed information systems and by reviewing basic measurement and modeling theory. Thereafter, previous evaluation methods aimed at determining the level of IT security of distributed information systems were reviewed. Last, by using the theoretic foundation and the ideas from reviewed efforts, a new evaluation method, aimed at determining the level of IT security of vast dynamic component-based distributed information systems, was developed.

Results: This thesis outlines a new method, CAESAR, capable of predicting the security level in parts of, or an entire, component-based distributed information system. The CAESAR method consists of a modeling technique and an evaluation algorithm. In addition, a Microsoft Windows compliant software, ROME, which allows the user to easily model and evaluate distributed systems using the CAESAR method, is made available.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Component Security"

1

Lembaga Studi Pertahanan dan Studi Strategis Indonesia. Reserve component bill. Jakarta, Indonesia: Lembaga Studi Pertahanan dan Studi Strategis Indonesia, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Food and Agriculture Organization of the United Nations. Emergency Operations and Rehabilitation Division. The FAO component of the 2011 consolidated appeals. Rome: Emergency Operations and Rehabilitation Division, Food and Agriculture Organization of the United Nations, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joe, Hogler, Project Air Force (U.S.). Strategy and Doctrine Program, and Rand Corporation, eds. Understanding country planning: A guide for Air Force component planners. Santa Monica, California: Rand Corporation, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

ACM, Policy '98 (1998 Washington D. C. ). Proceedings of the ethics and social impact component: ACM Policy '98 : shaping policy in the information age, May 10, 1998, Washington, D.C. USA. New York, NY: Association for Computing Machinery, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Overstay tracking: A key component of homeland security and a layered defense : report to the Chairman, Committee on the Judiciary, House of Representatives. Washington, D.C: GAO, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Windows registry forensics: Advanced digital forensic analysis of the Windows registry. Burlington, MA: Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kingsbury, Nancy R. Homeland security: Overstay tracking is a key component of a layered defense : statement of Nancy R. Kingsbury, managing director, Applied Research and Methods : testimony before the Subcommittee on Immigration, Border Security, and Claims, Committee on the Judiciary, House of Representatives. [Washington, D.C.]: U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on National Security. Military Personnel Subcommittee. Reserve component issues from the quadrennial defense review: Hearing before the Military Personnel Subcommittee of the Committee on National Security, House of Representatives, One Hundred Fifth Congress, first session, hearing held July 29, 1997. Washington: U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Nuclear weapons: Capabilities of DOE's limited life component program to meet operational needs : report to the Committee on Armed Services, U.S. Senate. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Combating terrorism: Training and equipping reserve component forces : hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, May 11, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Component Security"

1

Moon, Chang-Joo, and Hoh Peter In. "Inconsistency Detection of Authorization Policies in Distributed Component Environment." In Information Security Applications, 39–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Damiani, E., S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. "XML Access Control Systems: A Component-Based Approach." In Data and Application Security, 39–50. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/0-306-47008-x_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Su, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, and Jing Jin. "Assessing Attack Surface with Component-Based Package Dependency." In Network and System Security, 405–17. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al Ali, Rima, Tomas Bures, Petr Hnetynka, Filip Krijt, Frantisek Plasil, and Jiri Vinarek. "Dynamic Security Specification Through Autonomic Component Ensembles." In Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, 172–85. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03424-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Dongjin, Ying Li, Yi Zhou, and Zhaohui Wu. "Security and Performance in Network Component Architecture." In Computational Science – ICCS 2006, 1055–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pedro, Emilio San, Ionuț Riza, Anca Bandoi, and Camelia-Maria Olari Perju. "Information Security: Component of Corporate Social Responsibility." In Essential Issues in Corporate Social Responsibility, 85–100. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39229-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Kyoung-Mi. "Component-Based Online Learning for Face Detection and Verification." In Computational Intelligence and Security, 832–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596981_121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Jinwen, Fei Ge, and Dengpan Gao. "Two Adaptive Matching Learning Algorithms for Independent Component Analysis." In Computational Intelligence and Security, 915–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lanotte, Ruggero, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, and Enrico Tronci. "Automatic Covert Channel Analysis of a Multilevel Secure Component." In Information and Communications Security, 249–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30191-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Cheng-Kang, and Wen-Guey Tzeng. "Distributed Key Generation as a Component of an Integrated Protocol." In Information and Communications Security, 411–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36159-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Component Security"

1

Dixit, Anurag. "Intra-component security certification." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Liping, Jun Hu, Bo Yang, Qing Shao, and Gang Peng. "A new acceleration switch based on separated mass component and elastic component." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hsu, Charles, and Harold Szu. "Sequential principal component analysis." In SPIE Defense, Security, and Sensing, edited by Harold Szu. SPIE, 2011. http://dx.doi.org/10.1117/12.887509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Сидорина, Татьяна, Tat'yana Sidorina, Ксения Крамаренко, and Tat'yana Sidorina. "THE FINANCIAL COMPONENT OF ECONOMIC SECURITY OF ENTERPRISE." In Topical issues of ensuring economic security in the Russian Federation in the digital economy. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/2286.

Full text
Abstract:
The article is devoted to assessing the level of the financial component of the economic security of an enterprise. The calculation indicators of the financial component of the system of economic diagnostics of economic security of a particular enterprise are calculated. As an instrument for ensuring the economic security of the enterprise, the creation of a system of economic security of the enterprise is considered.
APA, Harvard, Vancouver, ISO, and other styles
5

Dyrda, Michal, Maciej Malawski, Marian Bubak, and Syed Naqvi. "Providing security for MOCCA component environment." In Distributed Processing (IPDPS). IEEE, 2009. http://dx.doi.org/10.1109/ipdps.2009.5161082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fadhel, Nawfal F., Richard M. Crowder, Fatimah Akeel, and Gary B. Wills. "Component for 3D printing provenance framework: Security properties components for provenance framework." In 2014 World Congress on Internet Security (WorldCIS). IEEE, 2014. http://dx.doi.org/10.1109/worldcis.2014.7028174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jokanovic, Branka, Moeness Amin, Fauzia Ahmad, and Boualem Boashash. "Radar fall detection using principal component analysis." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2225106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Varney, Nina M., and Vijayan K. Asari. "Volume component analysis for classification of LiDAR data." In SPIE Defense + Security, edited by David Casasent and Mohammad S. Alam. SPIE, 2015. http://dx.doi.org/10.1117/12.2179268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Illig, David W., William D. Jemison, and Linda J. Mullen. "Independent component analysis for underwater lidar clutter rejection." In SPIE Defense + Security, edited by Weilin W. Hou and Robert A. Arnone. SPIE, 2016. http://dx.doi.org/10.1117/12.2222817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Masarik, Matthew P., Joseph Burns, Brian T. Thelen, Jack Kelly, and Timothy C. Havens. "GPR anomaly detection with robust principal component analysis." In SPIE Defense + Security, edited by Steven S. Bishop and Jason C. Isaacs. SPIE, 2015. http://dx.doi.org/10.1117/12.2176571.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Component Security"

1

Turke, Andy. Development and Demonstration of a Security Core Component. Office of Scientific and Technical Information (OSTI), February 2014. http://dx.doi.org/10.2172/1162156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Jeffrey A. United States Border Security and Reserve Component Forces. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada469373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kacsur, Charles J., and Jr. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada420059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rivera, Asdrubal. Total Force Component: A Transformed Army Reserve for the 21st Century Security Environment. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada448797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Davis, T. G. Assessing the Effects of Bush Administration National Security Policy, on the Air Force Active/Reserve Component Mix. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada424524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Corral, Leonardo, and Giulia Zane. Chimborazo Rural Investment Project: Rural Roads Component Impact Evaluation. Inter-American Development Bank, January 2021. http://dx.doi.org/10.18235/0003046.

Full text
Abstract:
This paper evaluates the impact of rural roads improvement works to benefit indigenous communities in the highlands of Ecuador, largely dependent on agriculture for their livelihoods. The findings suggest that the program had a positive impact on health and that it increased enrollment in secondary education. We find no evidence that treated households increased their investment in plot improvements and agricultural inputs. However, household members are more likely to report self-employment in agriculture as their main occupation. The effect on agricultural output and sales was positive but not statistically significant. Finally, there is no evidence that the program had any positive effect on overall household income, female empowerment and food security.
APA, Harvard, Vancouver, ISO, and other styles
7

Khan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.

Full text
Abstract:
Semiconductors are a key component in fueling scientific progress, promoting economic advancement, and ensuring national security. This issue brief summarizes each component of the semiconductor supply chain and where the United States and its allies possess the greatest leverage. A related policy brief, “Securing Semiconductor Supply Chains,” recommends policy actions to ensure the United States maintains this leverage and uses it to promote the beneficial use of emerging technologies, such as artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
8

Murdick, Dewey, Daniel Chou, Ryan Fedasiuk, and Emily Weinstein. The Public AI Research Portfolio of China’s Security Forces. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/20200057.

Full text
Abstract:
New analytic tools are used in this data brief to explore the public artificial intelligence (AI) research portfolio of China’s security forces. The methods contextualize Chinese-language scholarly papers that claim a direct working affiliation with components of the Ministry of Public Security, People's Armed Police Force, and People’s Liberation Army. The authors review potential uses of computer vision, robotics, natural language processing and general AI research.
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, April 2021. http://dx.doi.org/10.31979/mti.2021.1937.

Full text
Abstract:
Ninety percent of the world’s trade goods travel by surface transportation, using maritime, road and rail assets. The security of the goods in transit, the infrastructure supporting the movement, and the vehicles, are required to ensure that international commerce proceeds successfully. Much has been written about the surface supply chain itself, but little has focused on the security of these components. This report provides a guide for those wanting an increased understanding of the security issues that supply chain surface transportation systems confront and a blueprint to guide their future research.
APA, Harvard, Vancouver, ISO, and other styles
10

Franusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), March 2016. http://dx.doi.org/10.2172/1242462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography