Academic literature on the topic 'Security policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security policy"

1

Banks, Simon. "Security policy." Computers & Security 9, no. 7 (November 1990): 605–10. http://dx.doi.org/10.1016/0167-4048(90)90058-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ogi, Adolf. "Security through cooperation: Switzerland's security policy." RUSI Journal 145, no. 3 (June 2000): 37–39. http://dx.doi.org/10.1080/03071840008446531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bilocerkowycz, Jaroslaw, and Taras Kuzio. "Ukrainian Security Policy." Russian Review 56, no. 1 (January 1997): 145. http://dx.doi.org/10.2307/131507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duncan, Peter J. S. "Indian security policy." International Affairs 63, no. 3 (1987): 528–29. http://dx.doi.org/10.2307/2619328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Rodney W., and Raju G. C. Thomas. "Indian Security Policy." Pacific Affairs 60, no. 4 (1987): 687. http://dx.doi.org/10.2307/2759213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lagassé, Philippe, and Justin Massie. "Canadian Security Policy." International Journal: Canada's Journal of Global Policy Analysis 64, no. 3 (September 2009): 601–4. http://dx.doi.org/10.1177/002070200906400301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Broderick, J. S. "VPN Security Policy." Information Security Technical Report 6, no. 1 (March 2001): 31–34. http://dx.doi.org/10.1016/s1363-4127(01)00105-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pounder, Chris. "Security policy update." Computers & Security 21, no. 7 (November 2002): 620–23. http://dx.doi.org/10.1016/s0167-4048(02)01109-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weiller, Matthew A. "SPD security policy." Survival 30, no. 6 (November 1988): 515–28. http://dx.doi.org/10.1080/00396338808442437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hunt, Kenneth. "Japan's security policy." Survival 31, no. 3 (May 1989): 201–7. http://dx.doi.org/10.1080/00396338908442466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security policy"

1

Al-Saud, Naef bin Ahmed. "Saudi national security policy." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

PITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.

Full text
Abstract:
Computer networks have become an important part of modern society, and computer network security is crucial for their correct and continuous operation. The security aspects of computer networks are defined by network security policies. The term policy, in general, is defined as ``a definite goal, course or method of action to guide and determine present and future decisions''. In the context of computer networks, a policy is ``a set of rules to administer, manage, and control access to network resources''. Network security policies are enforced by special network appliances, so called security controls.Different types of security policies are enforced by different types of security controls. Network security policies are hard to manage, and errors are quite common. The problem exists because network administrators do not have a good overview of the network, the defined policies and the interaction between them. Researchers have proposed different techniques for network security policy analysis, which aim to identify errors within policies so that administrators can correct them. There are three different solution approaches: anomaly analysis, reachability analysis and policy comparison. Anomaly analysis searches for potential semantic errors within policy rules, and can also be used to identify possible policy optimizations. Reachability analysis evaluates allowed communication within a computer network and can determine if a certain host can reach a service or a set of services. Policy comparison compares two or more network security policies and represents the differences between them in an intuitive way. Although research in this field has been carried out for over a decade, there is still no clear answer on how to reduce policy errors. The different analysis techniques have their pros and cons, but none of them is a sufficient solution. More precisely, they are mainly complements to each other, as one analysis technique finds policy errors which remain unknown to another. Therefore, to be able to have a complete analysis of the computer network, multiple models must be instantiated. An analysis model that can perform all types of analysis techniques is desirable and has three main advantages. Firstly, the model can cover the greatest number of possible policy errors. Secondly, the computational overhead of instantiating the model is required only once. Thirdly, research effort is reduced because improvements and extensions to the model are applied to all three analysis types at the same time. Fourthly, new algorithms can be evaluated by comparing their performance directly to each other. This work proposes a new analysis model which is capable of performing all three analysis techniques. Security policies and the network topology are represented by the so-called Geometric-Model. The Geometric-Model is a formal model based on the set theory and geometric interpretation of policy rules. Policy rules are defined according to the condition-action format: if the condition holds then the action is applied. A security policy is expressed as a set of rules, a resolution strategy which selects the action when more than one rule applies, external data used by the resolution strategy and a default action in case no rule applies. This work also introduces the concept of Equivalent-Policy, which is calculated on the network topology and the policies involved. All analysis techniques are performed on it with a much higher performance. A precomputation phase is required for two reasons. Firstly, security policies which modify the traffic must be transformed to gain linear behaviour. Secondly, there are much fewer rules required to represent the global behaviour of a set of policies than the sum of the rules in the involved policies. The analysis model can handle the most common security policies and is designed to be extensible for future security policy types. As already mentioned the Geometric-Model can represent all types of security policies, but the calculation of the Equivalent-Policy has some small dependencies on the details of different policy types. Therefore, the computation of the Equivalent-Policy must be tweaked to support new types. Since the model and the computation of the Equivalent-Policy was designed to be extendible, the effort required to introduce a new security policy type is minimal. The anomaly analysis can be performed on computer networks containing different security policies. The policy comparison can perform an Implementation-Verification among high-level security requirements and an entire computer network containing different security policies. The policy comparison can perform a ChangeImpact-Analysis of an entire network containing different security policies. The proposed model is implemented in a working prototype, and a performance evaluation has been performed. The performance of the implementation is more than sufficient for real scenarios. Although the calculation of the Equivalent-Policy requires a significant amount of time, it is still manageable and is required only once. The execution of the different analysis techniques is fast, and generally the results are calculated in real time. The implementation also exposes an API for future integration in different frameworks or software packages. Based on the API, a complete tool was implemented, with a graphical user interface and additional features.
APA, Harvard, Vancouver, ISO, and other styles
3

Baratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.

Full text
Abstract:
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
4

Ortwein, Michael T. "Establishing Regis network security policy." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/MOrtwein2005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.

Full text
Abstract:
Récemment, les systèmes distribués sont devenus une catégorie fondamentale de systèmes informatiques. Par conséquent, leur sécurité est devenue essentielle. La recherche décrite dans ce document vise à apporter un éclaircissement sur leurs vulnérabilités quant à la sécurité. Pour ce faire, on a examiné les propriétés de sécurité qu'un système distribué considéré sécuritaire doit supporter. En cherchant un système avec lequel travailler, on a étudié des failles de sécurité des systèmes distribués existants. On a étudié la sécurité de Java et des outils utilisés pour sécuriser ces systèmes. Suite à ces recherches, un nouveau modèle de sécurité Java imposant de nouvelles propriétés de sécurité a été développé. Ce document commence par les résultats de notre recherche sur les systèmes distribués, les outils de sécurité, et la sécurité de Java. Ensuite, on décrit les détails du nouveau système pour finalement faire la démonstration des améliorations qu'apporte ce système avec un exemple.
Recently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
APA, Harvard, Vancouver, ISO, and other styles
6

Dilek, Cahit Armagan. "Turkey's security policy and NATO." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, Khawar. "Pakistan's Afghanistan policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHussain.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tracy, Tommy J. "The dynamics of German security policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA299934.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 1995.
Thesis advisor(s): David S. Yost. "June 1995." Bibliography: p. 103-111. Also available online. System requirements: Adobe Acrobat Reader.
APA, Harvard, Vancouver, ISO, and other styles
9

Malone, Victor Steven. "German security policy : continuity and change." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toktomushev, Kemel. "Regime security and Kyrgyz foreign policy." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16245.

Full text
Abstract:
This thesis presents a comprehensive study of Kyrgyz foreign policy from the early 1990s to 2011. It seeks to answer the following research question: how and to what extent does regime security affect Kyrgyz foreign policymaking? In so doing, this work aims to contribute to the understanding of Central Asian politics and the foreign policy sources of weak states across the post-Soviet space. The underlying theme of this dissertation is centred on the question whether neorealist or constructivist traditions provide a more in-depth account of the erratic Kyrgyz foreign policymaking. Notwithstanding a myriad of studies on weak states, the analysis of their foreign policies is limited and mostly characterised by idiosyncratic, reductionist and great power approaches. In this respect, an interpretive and inductive framework integrative of both internal and external variables and with properly contextualised causal mechanisms may explain the international behaviour of weak states in broader and more genuine terms. Thus, the puzzle to be resolved is whether the concepts of rent-seeking and virtual politics can either substitute for or complement the New Great Game narratives in the context of weak states in general and Kyrgyzstan in particular.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security policy"

1

Democrats, Liberal. Security policy. Dorchester: Published on behalf of the Liberal Democrats by Liberal Democrat Publications, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zając, Justyna. Poland's Security Policy. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-59500-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saito, Toshio. Japan's security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goebel, Peter. German security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nakatsuji, Keiji. Japan's Security Policy. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003231653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Indonesia, Dewan Kelautan. Maritime security policy. [Jakarta]: Kementerian Kelautan dan Perikanan, Sekretariat Jenderal, Satker Dewan Kelautan Indonesia, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saito, Toshio. Japan's security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuzio, Taras. Ukrainian security policy. Westport, Conn: Praeger, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pál, Dunay. Hungary's security policy. Hamburg: Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1937-, Patterson David S., and United States. Dept. of State., eds. National security policy. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security policy"

1

Zhang, Haining, and Yan Wang. "Security Policy." In The Authoritative Guide on Harbor, 131–69. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2727-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "security policy." In Computer Science and Communications Dictionary, 1536. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bush, Richard. "Security policy." In Routledge Handbook of Contemporary Taiwan, 529–43. New York, NY: Routledge, [2016]: Routledge, 2016. http://dx.doi.org/10.4324/9781315769523-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Betz, Joachim. "Social Security." In Development Policy, 91–101. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-35011-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy, 41–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beach, Derek. "Security Policies." In Analyzing Foreign Policy, 151–71. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kabay, M. E., and Bridgitt Robertson. "Security Policy Guidelines." In Computer Security Handbook, 44.1–44.17. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shao, Zisheng. "Social Security Policy." In The New Urban Area Development, 295–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44958-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garrett, Rob. "Security and Policy." In Pro SharePoint 2013 Administration, 203–34. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4942-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McKay, Ailsa. "Social Security Policy." In Developments in British Social Policy, 112–29. London: Macmillan Education UK, 1998. http://dx.doi.org/10.1007/978-1-349-26638-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security policy"

1

Rehrl, Jochen, and Arnold Kammel. "THE SECURITY POLICY DIMENSION OF TRAINING AND ELEARNING." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-001.

Full text
Abstract:
The European Security and Defence College is a 'network college' which is comprised of 120 national entities including diplomatic academies, national defence universities, police colleges and NGOs. The article below is based on that specific training environment, in which the training audience is mainly recruited from the EU institutions and the country's administration, i.e. from various ministries and agencies. The training environment is international and includes both military and civilian participants, with a focus on ensuring gender and regional balance among trainees. In general, the ESDC provides training and education for the Union's Common Security and Defence Policy (CSDP) in the wider context of the Common Foreign and Security Policy (CFSP) at European.level.
APA, Harvard, Vancouver, ISO, and other styles
2

"Security/Policy [breaker page]." In Proceedings. 14th IEEE International Sympsoium on High Performance Distributed Computing. IEEE, 2005. http://dx.doi.org/10.1109/hpdc.2005.1520961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Srivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." In the 32nd ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1993498.1993539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yongsheng, Cuicui Sun, Yang Jing, and Wang Ying. "Web Services Security Policy." In 2010 International Conference on Multimedia Information Networking and Security. IEEE, 2010. http://dx.doi.org/10.1109/mines.2010.223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alam, Mahtab, and M. U. Bokhari. "Information Security Policy Architecture." In International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccima.2007.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lim, Yow Tzu, Pau-Chen Cheng, Pankaj Rohatgi, and John A. Clark. "Dynamic security policy learning." In the first ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lobo, Jorge, Elisa Bertino, and Alessandra Russos. "On Security Policy Migrations." In SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3381991.3395613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Chao, Shuohong Wang, Haiyang Sun, and Zhengwei Qi. "DefDroid: Securing Android with Fine-Grained Security Policy." In The 27th International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2015. http://dx.doi.org/10.18293/seke2015-162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security policy"

1

Irvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada605488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goebel, Peter. German Security Policy. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada385824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saito, Toshio. Japan's Security Policy. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada385898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Villamizar, C., C. Alaettinoglu, D. Meyer, and S. Murphy. Routing Policy System Security. RFC Editor, December 1999. http://dx.doi.org/10.17487/rfc2725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schaffer, Kim. CMVP security policy requirements:. Gaithersburg, MD: National Institute of Standards and Technology, March 2020. http://dx.doi.org/10.6028/nist.sp.800-140b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hawes, David. CMVP Security Policy Requirements:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-140br1.2pd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blaze, M., A. Keromytis, M. Richardson, and L. Sanchez. IP Security Policy (IPSP) Requirements. RFC Editor, August 2003. http://dx.doi.org/10.17487/rfc3586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Utrilla, Angel P. Spanish Security and Defense Policy. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada341513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McDermott, John, James Kirby, Myong Kang, and Bruce Montrose. Xenon Formal Security Policy Model. Fort Belvoir, VA: Defense Technical Information Center, August 2007. http://dx.doi.org/10.21236/ada471608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Gordon B., and Jr. US Policy Toward the European Security and Defense Policy. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada400957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography