Dissertations / Theses on the topic 'Security policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Al-Saud, Naef bin Ahmed. "Saudi national security policy." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613642.
Full textPITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.
Full textBaratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Full textIncludes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
Ortwein, Michael T. "Establishing Regis network security policy." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/MOrtwein2005.pdf.
Full textSamson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.
Full textRecently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
Dilek, Cahit Armagan. "Turkey's security policy and NATO." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23798.
Full textHussain, Khawar. "Pakistan's Afghanistan policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHussain.pdf.
Full textTracy, Tommy J. "The dynamics of German security policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA299934.
Full textThesis advisor(s): David S. Yost. "June 1995." Bibliography: p. 103-111. Also available online. System requirements: Adobe Acrobat Reader.
Malone, Victor Steven. "German security policy : continuity and change." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23912.
Full textToktomushev, Kemel. "Regime security and Kyrgyz foreign policy." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16245.
Full textDickson, James Carleton University Dissertation International Affairs. "Japanese security policy: change and continuity." Ottawa, 1993.
Find full textWignell, Valentina. "Security Representations in Environmental Migration Policy : A Policy Analysis on Environmental Migration Policy in Central America from a Human and State Security Perspective." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412840.
Full textSolomon, Dianne Blitstein. "Employee and Organization Security Value Alignment Through Value Sensitive Security Policy Design." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/4.
Full textGrout, Timothy J. "Norwegian security policy and new environmental challenges." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA307707.
Full textMateeva, Ralitza. "Determinants of U.S. security policy in Bulgaria." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA365585.
Full text"June 1999". Thesis advisor(s): David S. Yost, Rodney Kennedy-Minott. Includes bibliographical references. Also available online.
Civcik, Zeynep. "Changes And Continuities In Israeli Security Policy." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605756/index.pdf.
Full texts existential threat perception decreased but new threat perceptions of terrorism and conventional and nuclear military buildup in the region emerged
therefore security was redefined by the Israeli political and military decision-makers. In the last part the impact of the collapse of peace process and Sharon&rsquo
s coming to power on Israeli security policy is analyzed. Sharon&rsquo
s period can be defined by offensive security strategies aiming at preventing terror which has been the top security problem since the Al Aqsa Intifada. As a result, this thesis argues that Israeli security policy did not indicate significant changes until 1990s, however during 1990s Israeli security situation and security policy changed as a response to the regional and international developments. Post-2000 period witnessed changes as well with Sharon&rsquo
s returning to offensive strategies.
Bulgurcu, Burcu. "The antecedents of information security policy compliance." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1121.
Full textFrey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.
Full textMalan, LP, and Rooyen EJ van. "Community partnerships- enhancing municipal food security policy." Journal of Public Administration, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001174.
Full textAldrawiesh, Khalid. "Security policy architecture for web services environment." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7089.
Full textMahdi, Samiullah. "Security and foreign policy of landlocked states." Thesis, University of Massachusetts Boston, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10160222.
Full textWealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies and security measures.
Aryanpour, Amir. "An interoperability framework for security policy languages." Thesis, University of Bedfordshire, 2015. http://hdl.handle.net/10547/603532.
Full textGao, Zhuomin. "Conflict handling in policy-based security management." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000124.
Full textTitle from title page of source document. Document formatted into pages; contains v, 52 p.; also contains graphics. Includes vita. Includes bibliographical references.
Patterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textGheorghe, Gabriela. "Security Policy Enforcement in Service-Oriented Middleware." Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368918.
Full textGheorghe, Gabriela. "Security Policy Enforcement in Service-Oriented Middleware." Doctoral thesis, University of Trento, 2011. http://eprints-phd.biblio.unitn.it/673/1/PhD-Thesis-Gabriela.pdf.
Full textMUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textCowden, Daniel R. "Policy in conflict: the struggle between environmental policy and homeland security goals." Thesis, Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37605.
Full textSince the 1970s, every American president and many Congressional leaders have called for national energy independence as a top policy priority. Among many reasons the United States (U.S.) has been unable to deliver on this goal over four decades are certain environmental policies that may tend to inhibit efficiency in fuel consumption of vehicles. This study examines the unintended consequences of certain environmental policies for American homeland security. The analyses suggest that some environmental policies may have a deleterious effect on the ability of the United States to achieve a level of energy efficiency in the transportation sector that could contribute to achieving national energy security. This study suggests ways to achieve a level of sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be directly supporting terrorist organizations or, at a minimum, go toward supporting the spread of radical Islamic Salafism that is inimical to U.S. and Western interests. This inquiry examines evidence to show that Americas continuing dependence on other foreign oil, especially oil from the Middle East, is perilous to homeland security and compels limits to U.S. freedom of action in foreign affairs.
Pinéu, Daniel Filipe Dos Ramos. "The pedagogy of security : police assistance and liberal governmentality in American foreign policy." Thesis, Aberystwyth University, 2009. http://hdl.handle.net/2160/3b368c44-fc8f-4fab-816b-64346cf8b599.
Full textHamilton, Sheilah Elizabeth. "Private security and government : a Hong Kong perspective, 1841-1941 /." Thesis, Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575102.
Full textAhern, Bryan M. "U.S. security policy in Asia after Korean unification." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341097.
Full text"December 1997." Thesis advisor(s) Edward A. Olsen. Includes bibliographical references (p. 97-102). Also available online.
Johansson, Viktor. "The Security and Development Nexus: A Policy Analysis." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-39537.
Full textMajidi, Ghani. "Fiscal policy and social security reform in Iran." Thesis, University of Essex, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446044.
Full textScott, David Jonathan. "Abstracting application-level security policy for ubiquitous computing." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614755.
Full textKejdušová, Michaela. "US Security Policy towards the Iranian Nuclear Program." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162772.
Full textDyson, Philip Thomas Adrian. "The politics of German defence policy : policy leadership, Bundeswehr reform and European defence and security policy." Thesis, London School of Economics and Political Science (University of London), 2005. http://etheses.lse.ac.uk/1778/.
Full textAlwada’n, Tariq Falah. "Security for mobile grid systems." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7360.
Full textHong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.
Full textMwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.
Full textArmstrong, John. "Food security policy in Lao PDR : an analysis of policy narratives in use." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/21471/.
Full textReaves, Jeff W. "European Union Policy Against Energy Coercion: An Analysis of EU Energy Security Policy." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89671.
Full textMaster of Arts
This study focused on energy security policies in the European Union as a countermeasure to energy coercion. While this project sought to identify the effectiveness of the EU’s current policy, there were two outcomes. First, the thesis provided strong evidence to support that EU energy security policy is an effective countermeasure against energy coercion tactics. The second outcome was a model that enables the analysis of policy implementation in Europe. Topics discussed throughout this thesis include: Russian energy strategy, EU energy security policy, energy efficiency, and policy implementation. This study ultimately focused on the European Energy Security Strategy, which established a system of pillars that was designed to increase overall energy security through a multidimensional approach. The importance lies in the effectiveness of EU energy policy as a critical issue that must be examined to establish that European energy security policy can be used as an effective countermeasure to Russian energy coercion and initiatives.
Royds, Mollie. "Human security and Canadian foreign policy, Canada's international security dilemma in the new millenium." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64926.pdf.
Full textWaller, Robert Patrick. "Libyan national security policy, 1969-1994 : a study in irrationality and Third World security." Thesis, King's College London (University of London), 2000. https://kclpure.kcl.ac.uk/portal/en/theses/libyan-national-security-policy-19691994--a-study-in-irrationality-and-third-world-security(48fa0467-c1f6-4161-8a3f-61ca287471d4).html.
Full textDhirathiti, Nopraenue Sajjarax. "Identity transformation and Japan's UN security policy : from the Gulf Crisis to human security." Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1141/.
Full textLoeppky, Rodney D. (Rodney David) Carleton University Dissertation Political Science. "The dia-eclectics of European security: a critical evaluation of European Union security policy." Ottawa, 1995.
Find full textErforth, Benedikt. "Thinking Security: A Reflectivist Approach to France's Security Policy-Making in sub-Saharan Africa." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/369101.
Full textVALENZA, FULVIO. "Modelling and Analysis of Network Security Policies." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2676486.
Full textSinks, George W. "Reserve Policy for the Nuclear Age: The Development of Post-War American Reserve Policy, 1943-1955." Connect to resource, 1985. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1210099254.
Full textEmmenegger, Patrick. "Regulatory social policy : the politics of job security regulations /." Bern : Haupt, 2009. http://www.ub.unibe.ch/content/bibliotheken_sammlungen/sondersammlungen/dissen_bestellformular/index_ger.html.
Full textKaya, Taylan Ozgur. "The Common Foreign And Security Policy: The European Union." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/12605077/index.pdf.
Full textefforts to develop a coherent and effective foreign and security policy in the context of historical evolution of the CFSP. In this thesis, European States&rsquo
efforts to develop a coherent and effective foreign and security policy will be evaluated in three international political contexts. First period is Post World War II Period, second one is Post-Cold War Period and third one is Post September 11 Period. In the context of Post World War II period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy is shaped by the conditions of Cold War, Bipolar World and threat of Soviet expansionism towards Western Europe and characterized by the attempts such as European Defence Community, Fouchet Plan and European Political Cooperation. In the context of Post-Cold War period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy were shaped by ex-Yugoslavian Conflict in early 90s which brought new security challenges such as ethnic conflicts and instability in the ex-Communist States in Central and Eastern Europe. EU&rsquo
s attempts were characterized by the CFSP which was launched by the Maastricht Treaty and the CESDP which emerged after Kosovo War with Saint Malo Declaration as defence dimension of the CFSP. In the context of Post September 11 period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy were shaped by global fight against international terrorism. EU&rsquo
s attempts were characterized by adoption of European Security Strategy which accepted international terrorism, organized crime and proliferation of weapons of mass destruction as key threats towards Europe and aimed at developing a coherent vision of strategic objectives, shared threat assessment for European States in order to prevent divisions among EU States in future international events. The main argument of this thesis is that in order to be an important and effective actor in global politics, EU Member States should act coherently and speak with one voice. Their influence on important international issues is greater if they act as a coherent actor rather than acting individually.