Academic literature on the topic 'Security policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security policy"
Banks, Simon. "Security policy." Computers & Security 9, no. 7 (November 1990): 605–10. http://dx.doi.org/10.1016/0167-4048(90)90058-2.
Full textOgi, Adolf. "Security through cooperation: Switzerland's security policy." RUSI Journal 145, no. 3 (June 2000): 37–39. http://dx.doi.org/10.1080/03071840008446531.
Full textBilocerkowycz, Jaroslaw, and Taras Kuzio. "Ukrainian Security Policy." Russian Review 56, no. 1 (January 1997): 145. http://dx.doi.org/10.2307/131507.
Full textDuncan, Peter J. S. "Indian security policy." International Affairs 63, no. 3 (1987): 528–29. http://dx.doi.org/10.2307/2619328.
Full textJones, Rodney W., and Raju G. C. Thomas. "Indian Security Policy." Pacific Affairs 60, no. 4 (1987): 687. http://dx.doi.org/10.2307/2759213.
Full textLagassé, Philippe, and Justin Massie. "Canadian Security Policy." International Journal: Canada's Journal of Global Policy Analysis 64, no. 3 (September 2009): 601–4. http://dx.doi.org/10.1177/002070200906400301.
Full textBroderick, J. S. "VPN Security Policy." Information Security Technical Report 6, no. 1 (March 2001): 31–34. http://dx.doi.org/10.1016/s1363-4127(01)00105-4.
Full textPounder, Chris. "Security policy update." Computers & Security 21, no. 7 (November 2002): 620–23. http://dx.doi.org/10.1016/s0167-4048(02)01109-4.
Full textWeiller, Matthew A. "SPD security policy." Survival 30, no. 6 (November 1988): 515–28. http://dx.doi.org/10.1080/00396338808442437.
Full textHunt, Kenneth. "Japan's security policy." Survival 31, no. 3 (May 1989): 201–7. http://dx.doi.org/10.1080/00396338908442466.
Full textDissertations / Theses on the topic "Security policy"
Al-Saud, Naef bin Ahmed. "Saudi national security policy." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613642.
Full textPITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.
Full textBaratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Full textIncludes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
Ortwein, Michael T. "Establishing Regis network security policy." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/MOrtwein2005.pdf.
Full textSamson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.
Full textRecently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
Dilek, Cahit Armagan. "Turkey's security policy and NATO." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23798.
Full textHussain, Khawar. "Pakistan's Afghanistan policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHussain.pdf.
Full textTracy, Tommy J. "The dynamics of German security policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA299934.
Full textThesis advisor(s): David S. Yost. "June 1995." Bibliography: p. 103-111. Also available online. System requirements: Adobe Acrobat Reader.
Malone, Victor Steven. "German security policy : continuity and change." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23912.
Full textToktomushev, Kemel. "Regime security and Kyrgyz foreign policy." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16245.
Full textBooks on the topic "Security policy"
Democrats, Liberal. Security policy. Dorchester: Published on behalf of the Liberal Democrats by Liberal Democrat Publications, 1993.
Find full textZając, Justyna. Poland's Security Policy. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-59500-3.
Full textSaito, Toshio. Japan's security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.
Find full textGoebel, Peter. German security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.
Find full textNakatsuji, Keiji. Japan's Security Policy. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003231653.
Full textIndonesia, Dewan Kelautan. Maritime security policy. [Jakarta]: Kementerian Kelautan dan Perikanan, Sekretariat Jenderal, Satker Dewan Kelautan Indonesia, 2011.
Find full textSaito, Toshio. Japan's security policy. [Washington, D.C.?]: National Defense University, Institute for National Strategic Studies, 1999.
Find full textPál, Dunay. Hungary's security policy. Hamburg: Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg, 1987.
Find full text1937-, Patterson David S., and United States. Dept. of State., eds. National security policy. Washington: U.S. G.P.O., 2002.
Find full textBook chapters on the topic "Security policy"
Zhang, Haining, and Yan Wang. "Security Policy." In The Authoritative Guide on Harbor, 131–69. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2727-0_4.
Full textWeik, Martin H. "security policy." In Computer Science and Communications Dictionary, 1536. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16824.
Full textBush, Richard. "Security policy." In Routledge Handbook of Contemporary Taiwan, 529–43. New York, NY: Routledge, [2016]: Routledge, 2016. http://dx.doi.org/10.4324/9781315769523-35.
Full textBetz, Joachim. "Social Security." In Development Policy, 91–101. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-35011-6_9.
Full textHirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy, 41–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.
Full textBeach, Derek. "Security Policies." In Analyzing Foreign Policy, 151–71. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.
Full textKabay, M. E., and Bridgitt Robertson. "Security Policy Guidelines." In Computer Security Handbook, 44.1–44.17. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch44.
Full textShao, Zisheng. "Social Security Policy." In The New Urban Area Development, 295–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44958-5_36.
Full textGarrett, Rob. "Security and Policy." In Pro SharePoint 2013 Administration, 203–34. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4942-9_7.
Full textMcKay, Ailsa. "Social Security Policy." In Developments in British Social Policy, 112–29. London: Macmillan Education UK, 1998. http://dx.doi.org/10.1007/978-1-349-26638-8_8.
Full textConference papers on the topic "Security policy"
Rehrl, Jochen, and Arnold Kammel. "THE SECURITY POLICY DIMENSION OF TRAINING AND ELEARNING." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-001.
Full text"Security/Policy [breaker page]." In Proceedings. 14th IEEE International Sympsoium on High Performance Distributed Computing. IEEE, 2005. http://dx.doi.org/10.1109/hpdc.2005.1520961.
Full textSrivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." In the 32nd ACM SIGPLAN conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1993498.1993539.
Full textZhang, Yongsheng, Cuicui Sun, Yang Jing, and Wang Ying. "Web Services Security Policy." In 2010 International Conference on Multimedia Information Networking and Security. IEEE, 2010. http://dx.doi.org/10.1109/mines.2010.223.
Full textAlam, Mahtab, and M. U. Bokhari. "Information Security Policy Architecture." In International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccima.2007.275.
Full textLim, Yow Tzu, Pau-Chen Cheng, Pankaj Rohatgi, and John A. Clark. "Dynamic security policy learning." In the first ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1655168.1655177.
Full textLobo, Jorge, Elisa Bertino, and Alessandra Russos. "On Security Policy Migrations." In SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3381991.3395613.
Full textSingh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Full textHuang, Chao, Shuohong Wang, Haiyang Sun, and Zhengwei Qi. "DefDroid: Securing Android with Fine-Grained Security Policy." In The 27th International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2015. http://dx.doi.org/10.18293/seke2015-162.
Full textKotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.
Full textReports on the topic "Security policy"
Irvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada605488.
Full textGoebel, Peter. German Security Policy. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada385824.
Full textSaito, Toshio. Japan's Security Policy. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada385898.
Full textVillamizar, C., C. Alaettinoglu, D. Meyer, and S. Murphy. Routing Policy System Security. RFC Editor, December 1999. http://dx.doi.org/10.17487/rfc2725.
Full textSchaffer, Kim. CMVP security policy requirements:. Gaithersburg, MD: National Institute of Standards and Technology, March 2020. http://dx.doi.org/10.6028/nist.sp.800-140b.
Full textHawes, David. CMVP Security Policy Requirements:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-140br1.2pd.
Full textBlaze, M., A. Keromytis, M. Richardson, and L. Sanchez. IP Security Policy (IPSP) Requirements. RFC Editor, August 2003. http://dx.doi.org/10.17487/rfc3586.
Full textUtrilla, Angel P. Spanish Security and Defense Policy. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada341513.
Full textMcDermott, John, James Kirby, Myong Kang, and Bruce Montrose. Xenon Formal Security Policy Model. Fort Belvoir, VA: Defense Technical Information Center, August 2007. http://dx.doi.org/10.21236/ada471608.
Full textDavis, Gordon B., and Jr. US Policy Toward the European Security and Defense Policy. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada400957.
Full text