Academic literature on the topic 'Quality securing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quality securing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Quality securing":
Russ-Mohl, Stephan. "Securing journalistic quality." Studies in Communication Sciences 12, no. 1 (January 2012): 61. http://dx.doi.org/10.1016/j.scoms.2012.06.013.
Cook, Michael B., and Rosseel Kevin. "Securing Improvements in Water Quality." Journal of Structured Finance 3, no. 3 (October 31, 1997): 29–36. http://dx.doi.org/10.3905/jsf.3.3.29.
Hattingh, J., and M. Claassen. "Securing Water Quality for Life." International Journal of Water Resources Development 24, no. 3 (June 17, 2008): 401–15. http://dx.doi.org/10.1080/07900620802127333.
Palmer, R. Heather. "Securing Health Care Quality for Medicare." Health Affairs 14, no. 4 (January 1995): 89–100. http://dx.doi.org/10.1377/hlthaff.14.4.89.
Deleuran, L. C., and B. Boelt. "ORGANIC LEEK SEED PRODUCTION - SECURING SEED QUALITY." Acta Horticulturae, no. 898 (June 2011): 151–57. http://dx.doi.org/10.17660/actahortic.2011.898.17.
Lagerberg, Ingrid, Tim Evans, and Manocher Asaadi. "Quality Protocols for Biosolids – Securing the Future." Proceedings of the Water Environment Federation 2008, no. 3 (January 1, 2008): 599–606. http://dx.doi.org/10.2175/193864708788806269.
Vlkovský, Martin, and Petr Veselík. "Cargo Securing – Comparison of Different Quality Roads." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 67, no. 4 (2019): 1015–23. http://dx.doi.org/10.11118/actaun201967041015.
George, Geogen, and Aditya Anil. "Securing Fog Gateways with Assured Quality of Service." Research Journal of Engineering and Technology 9, no. 4 (2018): 363. http://dx.doi.org/10.5958/2321-581x.2018.00049.1.
Gollmann, Dieter. "Securing Web applications." Information Security Technical Report 13, no. 1 (2008): 1–9. http://dx.doi.org/10.1016/j.istr.2008.02.002.
Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Dissertations / Theses on the topic "Quality securing":
Tantiwiwathanapan, Siriporn. "Securing Quality in Private Kindergartens in Bangkok Thailand: Perspectives of the Parents and the Kindergarten Directors." Thesis, University of Reading, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487293.
Shafae, Mohammed Saeed Abuelmakarm. "Advancing the Utility of Manufacturing Data for Modeling, Monitoring, and Securing Machining Processes." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/96812.
PHD
Olivier, Tomás, and Tomás Olivier. "Institutional Design and Adaptation in Regional-Scale Common-Pool Resource Institutions: Securing Access to High-Quality Drinking Water in Boston, New York, Portland, and San Francisco." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625646.
Hwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.
Systems such as web applications, database systems, and cloud services regulate users’ access control to sensitive resources based on security policies. Organizations often manage security policies in an ad-hoc and inconsistent manner due to a lack of budget, resources, and staff. This management could cause crucial security problems such as unauthorized access to sensitive resources.
A security policy is a set of restrictions and properties that specify how a computing system prevents information and computing resources from being used in violation of an organization’s security laws, rules, and practices. In computer systems, security policies are enforced to ensure correct functioning of access control such as “who” (e.g., authorized users or processes) can perform actions under “what” conditions.
Policy authors may follow common patterns in specifying and maintaining security policies. Researchers applied data mining techniques for deriving (implicit) patterns such as a group of users (i.e., roles in RBAC policies) who have the same access permissions. Policy authors reuse common patterns to reduce mistakes. Anomalies of those patterns are candidates for inspection to determine whether these anomalies expose faults.
Faults (i.e., misconfigurations) in security policies could result in tragic consequences, such as disallowing an authorized user to access her/his resources and allowing malicious users to access critical resources. Therefore, to improve the quality of security policies in terms of policy correctness, policy authors must conduct rigorous testing and verification during testing and maintenance phases of software development process. However, manual test-input generation and verification is an error-prone, time-consuming, and tedious task.
In this dissertation, we propose approaches that help improve the quality of security policies automatically. Our research goal is to help policy authors through automated pattern mining and testing techniques in the efficient detection and removal of faults. This dissertation is comprised of three research projects where each project focuses on a specific software engineering task. The three research projects are as follows:
Pattern Mining. We present an approach to mine patterns from security policies used in open source software products. Our approach applies data mining techniques on policy evolution and specification data of those security policies to identify common patterns, which represent usage of security policies. Our approach uses mined patterns as policy specification rules and detect faults in security policies under analysis as deviations from the mined patterns.
Automated Test Generation. We present a systematic structural testing approach for security policies. Our approach is based on the concept of policy coverage, which helps test a policy’s structural entities (i.e., rules, predicates, and clauses) to check whether each entity is specified correctly. Our approach analyzes security policies under test and generates test cases automatically to achieve high structural coverage. These test cases can achieve high fault-detection capability (i.e., detecting faults).
Automated Test Selection for Regression Testing. We present a safe-test-selection approach for regression testing of security policies. Among given initial test cases in access control systems under test, our approach selects and executes only test cases that could expose different policy behaviors across multiple versions of security policies. Our approach helps detect unexpected policy behaviors (i.e., regression faults) caused by policy changes efficiently.
These three research project have resulted in the following contributions:
• Patterns characterizing correlations of attributes in security policies help detect faults.
• Structural coverage for security policies is closely related to fault-detection capability. An original set of test cases with higher structural coverage often achieves higher fault-detection capability. Furthermore, its reduced set of test cases while maintaining the same structural coverage achieves similar fault-detection capability with the original set.
• Substantial number of test cases for regression testing can be reduced to help improve performance.
Parada, Saul. "Impact of network security on spech quality." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2185.
This dissertation is about the impact of secure network environments on speech quality of IP Telephony. Results of the analysis of voice over different unsecure and secure communication links, such as IPsec and TLS, are presented. The use of secure network environments can affect speech quality. There is also a performance comparison of different cipher algorithms and a description on how the used security mechanisms influence the final MOS and R-factor variables. The presented results are based on numerous experiments which have been performed on a real IP-based network.
Epstein, Clare Anne. "Transit security : quality of life issues and strategies." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/65986.
Kane, Kathleen Joanne. "Diet quality and Food Security of Cancer Patients." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1524141604292618.
Ali, Wajahat, and Asad Muhammad. "Response Time Effects on Quality of Security Experience." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4131.
Phone Numbers: (1) Wajahat Ali (+923349783252) (2) Asad Muhammad (+923455172792)
Ahl, Gullan. "Reliabilitets- och validitetstestning av ADL-instrument RAINBOW - ett teamdokument." Thesis, Högskolan i Örebro, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54256.
Uppsatsarbete omfattande 10 poäng, C-nivå, inom ramen för arbetsterapeutprogrammet 120 p., Högskolan i Örebro, Institutionen för vårdvetenskap och omsorg. Författarens namn i uppsatsen är Gull-Britt Johansson.
Tomur, Emrah. "Security And Quality Of Service For Wireless Sensor Networks." Phd thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609359/index.pdf.
Books on the topic "Quality securing":
Great Britain. Department of Health. Working together: Securing a quality workforce for the NHS. London: Department of Health, 2000.
Hampshire Inspection and Advisory Service. Securing high quality history work at key stage 1: Inset materials produced by the Hampshire history team : Key Stage 1. Winchester: Hampshire County Council, 2003.
Porter, Brenda. Securing quality audit(or)s: Attempts at finding a solution in the United States, United Kingdom, Canada and New Zealand. Cranfield: Cranfield University School of Management, 1997.
Russ-Mohl, Stephan. Regulating self-regulation: The neglected case of journalism policies ; Securing quality in journalism and building media infrastructures on a European scale. Badia Fiesolana, Firenze: European University Institute, 1992.
United States. Government Accountability Office. Securing wastewater facilities: Utilities have made important upgrades but further improvements to key system components may be limited by costs and other constraints : report to the Chairman, Committee on Environment and Public Works, U.S. Senate. Washington, D.C: GAO, 2006.
Flaningam, Carl. Securing the future for Americans over sixty-five: An overview of the issues surrounding the quality of life for aging U.S. citizens. Lincolnwood, Ill. USA: National Texbook Co., 1988.
Committee, Wisconsin Governor's Health Care Worker Shortage. Health care Wisconsin: A collaborative agenda for solving Wisconsin's health care worker shortage and securing delivery of high quality health care for Wisconsin's citizens : a report. [Madison, Wis.?]: Governor's Health Care Worker Shortage Committee, 2002.
Lal, R., and B. A. Stewart. Food security and soil quality. Edited by Lal R and Stewart B. A. 1932-. Boca Raton: Taylor & Francis, 2010.
Tang, Seok-Yee, Peter Müller, and Hamid R. Sharif, eds. WiMAX Security and Quality of Service. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665749.
Dustin, Elfriede. Quality Web systems: Performance, security, and usability. Boston: Addison-Wesley, 2002.
Book chapters on the topic "Quality securing":
Price, Trevor, and Werner Schmitz-Thrun. "Securing e-Business." In Software Quality and Software Testing in Internet Times, 187–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-56333-1_12.
Bondar, Sergej, Christoph Ruppert, and Josip Stjepandic. "Securing Data Quality along the Supply Chain." In Product Lifecycle Management for Society, 702–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41501-2_69.
Ramya, P., and T. SairamVamsi. "Securing MANETs Using SHA3 Keccak Algorithm." In ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 328–35. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8461-5_36.
Brill, Eyal. "Implementing Machine Learning Algorithms for Water Quality Event Detection: Theory and Practice." In Securing Water and Wastewater Systems, 107–22. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01092-2_4.
Ølnes, Jon, Leif Buene, Anette Andresen, Håvard Grindheim, Jörg Apitzsch, and Adriano Rossi. "A General Quality Classification System for eIDs and e-Signatures." In ISSE 2009 Securing Electronic Business Processes, 72–86. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9363-5_7.
Balboni, Paolo. "Managing the Legal Risk in Providing Online Quality Certification Services in EU." In ISSE 2005 — Securing Electronic Business Processes, 189–200. Wiesbaden: Vieweg+Teubner Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-85237-3_19.
Kieseberg, Peter, and Edgar Weippl. "Securing Information Against Manipulation in the Production Systems Engineering Process." In Security and Quality in Cyber-Physical Systems Engineering, 335–56. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25312-7_12.
Holdgate, D. P., and E. A. Zandvoort. "Securing Cost Effective Product Quality, an Essential for Sustainable Business." In Plant Biotechnology and In Vitro Biology in the 21st Century, 709–12. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4661-6_159.
Woodfield, N. K., J. W. S. Longhurst, C. I. Beattie, and D. P. H. Laxen. "Designating Air Quality Management Areas (AQMAs) in the UK: Implications for Securing UK Air Quality Objectives." In Urban Air Quality — Recent Advances, 677–88. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0312-4_49.
Vlkovský, Martin, and Hana Vlachová. "Comparison of Cargo Securing Methods During Transport on Different Quality Roads." In Communications in Computer and Information Science, 200–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68028-2_10.
Conference papers on the topic "Quality securing":
Kim, Donghoon, and Mladen A. Vouk. "Securing Scientific Workflows." In 2015 International Conference on Software Quality, Reliability and Security - Companion (QRS-C). IEEE, 2015. http://dx.doi.org/10.1109/qrs-c.2015.25.
Yin, Heng, Bo Sheng, Haining Wang, and Jianping Pan. "Securing BGP through Keychain-based Signatures." In 2007 Fifteenth IEEE International Workshop on Quality of Service. IEEE, 2007. http://dx.doi.org/10.1109/iwqos.2007.376562.
Guse, Frank, Axel Kasper, and Bob Zinter. "Securing quality of camera-based biomedical optics." In SPIE BiOS: Biomedical Optics, edited by Ramesh Raghavachari and Rongguang Liang. SPIE, 2009. http://dx.doi.org/10.1117/12.812401.
Grau, M., J. Stjepandic, and C. Rupert. "Securing Data Quality Along the Supply Chain." In International Conference on Computer Applications in Shipbuilding 2013. RINA, 2013. http://dx.doi.org/10.3940/rina.iccas.2013.68.
Karmakar, Rajit, and Santanu Chattopadhyay. "On Securing Scan Obfuscation Strategies Against ScanSAT Attack." In 2020 21st International Symposium on Quality Electronic Design (ISQED). IEEE, 2020. http://dx.doi.org/10.1109/isqed48828.2020.9137003.
Zhang, Zhiming, Laurent Njilla, Charles Kamhoua, Kevin Kwiat, and Qiaoyan Yu. "Securing FPGA-based obsolete component replacement for legacy systems." In 2018 19th International Symposium on Quality Electronic Design (ISQED). IEEE, 2018. http://dx.doi.org/10.1109/isqed.2018.8357320.
Vlkovský, Martin, and Hana Vlachová. "Securing Cargo during Transport on Roads of Different Quality." In 5th International Conference on Vehicle Technology and Intelligent Transport Systems. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007617900250032.
Shining Wu, Yang Chen, Xiaoming Fu, and Jun Li. "NCShield: Securing decentralized, matrix factorization-based network coordinate systems." In 2012 IEEE 20th International Workshop on Quality of Service (IWQoS). IEEE, 2012. http://dx.doi.org/10.1109/iwqos.2012.6245983.
Nath, Arijit, Manik B. Bhosle, and Hemangee K. Kapoor. "SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion." In 2021 22nd International Symposium on Quality Electronic Design (ISQED). IEEE, 2021. http://dx.doi.org/10.1109/isqed51717.2021.9424292.
Carelli, Alberto, Carlo Alberto Cristofanini, Alessandro Vallero, Cataldo Basile, Paolo Prinetto, and Stefano Di Carlo. "Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems." In 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 2018. http://dx.doi.org/10.1109/aqtr.2018.8402795.
Reports on the topic "Quality securing":
Levin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada435861.
Mead, Nancy R., Eric D. Hough, II Stehney, and Theodore R. Security Quality Requirements Engineering (SQUARE) Methodology. Fort Belvoir, VA: Defense Technical Information Center, November 2005. http://dx.doi.org/10.21236/ada443493.
Irvine, Cynthia, and Tim Levin. Quality of Security Service: An Introduction. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada572032.
Spyropoulou, Evdoxia, Chris Agar, Timothy Levin, and Cynthia Irvine. IPsec Modulation for Quality of Security Service. Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada423568.
Spyropoulou, Evdoxia, Timothy Levin, and Cynthia Irvine. Calculating Costs for Quality of Security Service. Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada423571.
Irvine, Cynthis E., and Timothy E. Levin. An Introduction to Quality of Security Services. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada379660.
DEFENSE LOGISTICS AGENCY FORT BELVOIR VA. Office of Command Security Total Quality Management Plan. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada212906.
Spyropoulou, Evdoxin, Timothy E. Levin, and Cynthia E. Irvine. Demonstration of Quality of Security Service Awareness for IPsec. Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada407599.
Spyropoulou, Evdoxia, Timothy Levin, and Cynthia E. Irvine. Quality of Security Service Costing Demonstration for the MSHN Project. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377414.
Mercado, Leo A. The National Security Strategy and National Interests: Quantity or Quality? Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada393498.