Academic literature on the topic 'Multi-dimensional security framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-dimensional security framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-dimensional security framework"

1

Mohan, Ashwala, and Dr Bhanu Bhaskara. "Multi-dimensional trust aware routing for clustered IOT framework." International Journal of Engineering & Technology 7, no. 4.20 (2018): 15. http://dx.doi.org/10.14419/ijet.v7i4.20.22114.

Full text
Abstract:
With the increased interest in the utilization of smart applications, the IoT has gained a lot of popularity in the real world scenario. Due to the integration of different heterogeneous devices in a single network, various types of security issues will arise in the IoT. To ensure more security in IoT, this paper proposes a new trust aware routing framework based on the inherent communication and data properties of devices connected in the network. A new trust metric is derived in this paper by combining two different trusts based on the communication between nodes and the information passing
APA, Harvard, Vancouver, ISO, and other styles
2

Weijie, Zheng, Xu Dechao, Chen Yong, Zhang Xing, and Mu Qing. "Multi Step Transient Hybrid Simulation Framework Design and Practical Engineering Application for AC / DC Power Grid." E3S Web of Conferences 256 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202125601010.

Full text
Abstract:
Based on the large power grid simulation and the existing security prevention and control mode, this paper further integrates the multi-step transient hybrid simulation architecture computing technology to research the high-performance analysis and situational awareness simulation technology of interconnected AC / DC large power grid security and stability characteristics. So as to realize the “panoramic situational awareness, wide area coordinated control, flexible and efficient service” of large power grid, and improve the super large scale power grid Comprehensive security defense and intel
APA, Harvard, Vancouver, ISO, and other styles
3

Jouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." International Journal of Cloud Applications and Computing 6, no. 3 (2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.

Full text
Abstract:
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimen
APA, Harvard, Vancouver, ISO, and other styles
4

Risman, Helda, Pujo Widodo, and Resmanto Widodo. "COVID-19, SECURITIZATION, AND TERRORISM: NATIONAL SECURITY CHANGE MANAGEMENT DILEMMA." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 6, no. 3 (2020): 496. http://dx.doi.org/10.33172/jp.v6i3.1032.

Full text
Abstract:
<p>The Corona Virus Disease 2019 (Covid-19) pandemic is spreading globally, including in Indonesia, with a significant impact not only in limited a sphere of the threat to public health. The Covid-19 pandemic shaped social phenomenon followed by the changes in the social order of life into the securitization process with multi-dimensional impacts. Due to restrictions extensively, society's liability realities become an opening fissure for terrorist groups to persist in their actions. This rational context raises awareness for the State as State-actor in the security realm to generate sec
APA, Harvard, Vancouver, ISO, and other styles
5

Jansen, Louisa J. M., and Patrick P. Kalas. "Improving Governance of Tenure in Policy and Practice: A Conceptual Basis to Analyze Multi-Stakeholder Partnerships for Multi-Stakeholder Transformative Governance Illustrated with an Example from South Africa." Sustainability 12, no. 23 (2020): 9901. http://dx.doi.org/10.3390/su12239901.

Full text
Abstract:
Tenure governance is a complex and multi-dimensional issue that requires cross-sectoral and holistic approaches, gathering the resources, information and expert skills of a variety of actors while exploring innovative, polycentric multi-stakeholder governance arrangements to address collective action challenges. To do this, multi-stakeholder partnerships are formed where public and private partners pool their resources and competencies to address mutual goals more effectively. A coherent theoretical framework to analyze multi-stakeholder partnerships as part of multi-stakeholder governance is
APA, Harvard, Vancouver, ISO, and other styles
6

Obet, Dedy, Suharto Suharto, and Henri Mujoko. "CYBER COOPERATION IN THE FRAMEWORK OF THE ASEAN REGIME." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 2 (2021): 254. http://dx.doi.org/10.33172/jp.v7i2.1264.

Full text
Abstract:
<div><p class="Els-history-head">The COVID-19 pandemic has a given significant impact on both economics and internet-based digital services in Southeast Asia. It also applied to cross-border nontraditional security issues such as cyber-attacks that evolve continuously. The complexity of prevention acts towards cyber threats in Southeast Asia is quite complicated. Therefore, the ASEAN countries should form strong cooperation due to many anonymous and impromptu attacks. This research aims to analyze cyber cooperation within the ASEAN framework. The method applied in this article is t
APA, Harvard, Vancouver, ISO, and other styles
7

Angbo, Padam Kumar. "National Security Redesign after the COVID–19: Nepali Army’s Security Priority in Response to the Global Pandemics." Unity Journal 2 (August 11, 2021): 163–74. http://dx.doi.org/10.3126/unityj.v2i0.38823.

Full text
Abstract:
Pandemic disease always poses one of the greatest security threats to national security. It is widely discussed as a non-traditional threat candidate to national security (NDU, CACI, The Asymmetric Threat Symposium, 2008, p. 31). Indeed, the COVID-19 has not only unleashed havoc on developing nation but also provided a vital national security lesson exposing weaknesses in their capabilities to protect citizens. For example, Nepal has lost more than 2000 lives of its people and about 271,000 have severely suffered this viral infection, and the deaths with this pandemic in the US and UK are even
APA, Harvard, Vancouver, ISO, and other styles
8

Zurek, Monika, Aniek Hebinck, Adrian Leip, et al. "Assessing Sustainable Food and Nutrition Security of the EU Food System—An Integrated Approach." Sustainability 10, no. 11 (2018): 4271. http://dx.doi.org/10.3390/su10114271.

Full text
Abstract:
Steering the EU food system towards a sustainability transformation requires a vast and actionable knowledge base available to a range of public and private actors. Few have captured this complexity by assessing food systems from a multi-dimensional and multi-level perspective, which would include (1) nutrition and diet, environmental and economic outcomes together with social equity dimensions and (2) system interactions across country, EU and global scales. This paper addresses this gap in food systems research and science communication by providing an integrated analytical approach and new
APA, Harvard, Vancouver, ISO, and other styles
9

Walsh, Kieran, Eamon O'Shea, and Thomas Scharf. "Rural old-age social exclusion: a conceptual framework on mediators of exclusion across the lifecourse." Ageing and Society 40, no. 11 (2019): 2311–37. http://dx.doi.org/10.1017/s0144686x19000606.

Full text
Abstract:
AbstractSocial exclusion amongst rural-dwelling older adults and the role of the diversity of people and places in mediating the construction of that exclusion has not been adequately investigated or conceptualised in the international literature. Consequently, how ageing in a rural community can function to disadvantage or protect older people remains poorly understood. With the aim of advancing conceptual understanding on rural old-age social exclusion, this article explores how exclusion is manifest in the lifecourse experiences of rural-dwelling older adults and the role of mediating facto
APA, Harvard, Vancouver, ISO, and other styles
10

Wagh, Sameer, Paul Cuff, and Prateek Mittal. "Differentially Private Oblivious RAM." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 64–84. http://dx.doi.org/10.1515/popets-2018-0032.

Full text
Abstract:
Abstract In this work, we investigate if statistical privacy can enhance the performance of ORAM mechanisms while providing rigorous privacy guarantees. We propose a formal and rigorous framework for developing ORAM protocols with statistical security viz., a differentially private ORAM (DP-ORAM). We present Root ORAM, a family of DP-ORAMs that provide a tunable, multi-dimensional trade-off between the desired bandwidth overhead, local storage and system security. We theoretically analyze Root ORAM to quantify both its security and performance. We experimentally demonstrate the benefits of Roo
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Multi-dimensional security framework"

1

Darwish, Salaheddin. "A simulation-based methodology for the assessment of server-based security architectures for mobile ad hoc networks (MANETs)." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13823.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is typically a set of wireless mobile nodes enabled to communicate dynamically in a multi-hop manner without any pre-existing network infrastructure. MANETs have several unique characteristics in contrast to other typical networks, such as dynamic topology, intermittent connectivity, limited resources, and lack of physical security. Securing MANETs is a critical issue as these are vulnerable to many different attacks and failures and have no clear line of defence. To develop effective security services in MANETs, it is important to consider an appropriate trust
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multi-dimensional security framework"

1

Jouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch011.

Full text
Abstract:
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.
APA, Harvard, Vancouver, ISO, and other styles
2

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Security Problems in Cloud Computing Environments." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch046.

Full text
Abstract:
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.
APA, Harvard, Vancouver, ISO, and other styles
3

Jouini, Mouna, and Latifa Ben Arfa Rabai. "Security Problems in Cloud Computing Environments." In Apps Management and E-Commerce Transactions in Real-Time. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2449-6.ch004.

Full text
Abstract:
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.
APA, Harvard, Vancouver, ISO, and other styles
4

Bossuyt, Daniël. "Residents’ experiences of self-build housing." In The Self-Build Experience. Policy Press, 2020. http://dx.doi.org/10.1332/policypress/9781447348429.003.0008.

Full text
Abstract:
This chapter is concerned with why people assume the responsibility for building their own home and how they fulfil that role in the context of the Homeruskwartier in Almere in the Netherlands. It considers the rationales and design strategies self-builders employ, as well as how this interacts with the regulatory framework imposed by the municipality. The chapter draws upon a mixed methodology, combining quantitative survey data with in-depth interviews. The chapter concludes that there is a wide range of rationales and strategies employed by self-builders in the Almere Homeruskwartier. While some self-builders employ architects, others opt for using catalogue-builders or DIY. Customization and financial motives are both found to be particularly salient. Rather than delimiting creativity and imagination, residents feel the regulatory framework created a sense of possibility and security. Planners must take into account the multi-dimensional nature of the self-built home when developing form-based codes. Further research on self-organized housing provision should refrain from studying self-building practices in isolation, but engage with its relation to structuring institutional and economic logics.
APA, Harvard, Vancouver, ISO, and other styles
5

Hall, Cynthia, Regina Easley, Joniqua Howard, and Trina Halfhide. "The Role of Authentic Science Research and Education Outreach in Increasing Community Resilience." In Cases on the Diffusion and Adoption of Sustainable Development Practices. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2842-7.ch014.

Full text
Abstract:
Active, multi-dimensional learning is needed to establish higher-level scientific inquiry. Researchers who are engaged in scientific discovery are a valuable resource to communicate the link between science, society, and sustainability. Nontraditional settings like faith-based organizations and hobbies can play an important role in fostering greater scientific understanding. This chapter highlights the role that community structure (social, racial, and economic demographics) plays in developing successful project components by considering various theoretical frameworks to communicate sustainability principles to underserved communities. The researchers in these case studies presented the topics of ocean acidification and healthy soil to inner-city communities in Tampa, FL and Philadelphia, PA by utilizing authentic science research activities. Learners maximized the opportunities to construct new hypotheses and improve decision-making related to environmental stewardship behaviors and food security issues. A secondary but transformative outcome was increased interest in STEM fields among youth in cities with traditionally low performing schools.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-dimensional security framework"

1

Fink, Wolfgang. "Stochastic optimization framework (SOF) for computer-optimized design, engineering, and performance of multi-dimensional systems and processes." In SPIE Defense and Security Symposium, edited by Wolfgang Fink. SPIE, 2008. http://dx.doi.org/10.1117/12.784440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!