To see the other types of publications on this topic, follow the link: Security policy.

Dissertations / Theses on the topic 'Security policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Al-Saud, Naef bin Ahmed. "Saudi national security policy." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

PITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.

Full text
Abstract:
Computer networks have become an important part of modern society, and computer network security is crucial for their correct and continuous operation. The security aspects of computer networks are defined by network security policies. The term policy, in general, is defined as ``a definite goal, course or method of action to guide and determine present and future decisions''. In the context of computer networks, a policy is ``a set of rules to administer, manage, and control access to network resources''. Network security policies are enforced by special network appliances, so called security controls.Different types of security policies are enforced by different types of security controls. Network security policies are hard to manage, and errors are quite common. The problem exists because network administrators do not have a good overview of the network, the defined policies and the interaction between them. Researchers have proposed different techniques for network security policy analysis, which aim to identify errors within policies so that administrators can correct them. There are three different solution approaches: anomaly analysis, reachability analysis and policy comparison. Anomaly analysis searches for potential semantic errors within policy rules, and can also be used to identify possible policy optimizations. Reachability analysis evaluates allowed communication within a computer network and can determine if a certain host can reach a service or a set of services. Policy comparison compares two or more network security policies and represents the differences between them in an intuitive way. Although research in this field has been carried out for over a decade, there is still no clear answer on how to reduce policy errors. The different analysis techniques have their pros and cons, but none of them is a sufficient solution. More precisely, they are mainly complements to each other, as one analysis technique finds policy errors which remain unknown to another. Therefore, to be able to have a complete analysis of the computer network, multiple models must be instantiated. An analysis model that can perform all types of analysis techniques is desirable and has three main advantages. Firstly, the model can cover the greatest number of possible policy errors. Secondly, the computational overhead of instantiating the model is required only once. Thirdly, research effort is reduced because improvements and extensions to the model are applied to all three analysis types at the same time. Fourthly, new algorithms can be evaluated by comparing their performance directly to each other. This work proposes a new analysis model which is capable of performing all three analysis techniques. Security policies and the network topology are represented by the so-called Geometric-Model. The Geometric-Model is a formal model based on the set theory and geometric interpretation of policy rules. Policy rules are defined according to the condition-action format: if the condition holds then the action is applied. A security policy is expressed as a set of rules, a resolution strategy which selects the action when more than one rule applies, external data used by the resolution strategy and a default action in case no rule applies. This work also introduces the concept of Equivalent-Policy, which is calculated on the network topology and the policies involved. All analysis techniques are performed on it with a much higher performance. A precomputation phase is required for two reasons. Firstly, security policies which modify the traffic must be transformed to gain linear behaviour. Secondly, there are much fewer rules required to represent the global behaviour of a set of policies than the sum of the rules in the involved policies. The analysis model can handle the most common security policies and is designed to be extensible for future security policy types. As already mentioned the Geometric-Model can represent all types of security policies, but the calculation of the Equivalent-Policy has some small dependencies on the details of different policy types. Therefore, the computation of the Equivalent-Policy must be tweaked to support new types. Since the model and the computation of the Equivalent-Policy was designed to be extendible, the effort required to introduce a new security policy type is minimal. The anomaly analysis can be performed on computer networks containing different security policies. The policy comparison can perform an Implementation-Verification among high-level security requirements and an entire computer network containing different security policies. The policy comparison can perform a ChangeImpact-Analysis of an entire network containing different security policies. The proposed model is implemented in a working prototype, and a performance evaluation has been performed. The performance of the implementation is more than sufficient for real scenarios. Although the calculation of the Equivalent-Policy requires a significant amount of time, it is still manageable and is required only once. The execution of the different analysis techniques is fast, and generally the results are calculated in real time. The implementation also exposes an API for future integration in different frameworks or software packages. Based on the API, a complete tool was implemented, with a graphical user interface and additional features.
APA, Harvard, Vancouver, ISO, and other styles
3

Baratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.

Full text
Abstract:
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
4

Ortwein, Michael T. "Establishing Regis network security policy." [Denver, Colo.] : Regis University, 2005. http://165.236.235.140/lib/MOrtwein2005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samson, Frédéric. "Alternative Java Security Policy Model." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22020/22020.pdf.

Full text
Abstract:
Récemment, les systèmes distribués sont devenus une catégorie fondamentale de systèmes informatiques. Par conséquent, leur sécurité est devenue essentielle. La recherche décrite dans ce document vise à apporter un éclaircissement sur leurs vulnérabilités quant à la sécurité. Pour ce faire, on a examiné les propriétés de sécurité qu'un système distribué considéré sécuritaire doit supporter. En cherchant un système avec lequel travailler, on a étudié des failles de sécurité des systèmes distribués existants. On a étudié la sécurité de Java et des outils utilisés pour sécuriser ces systèmes. Suite à ces recherches, un nouveau modèle de sécurité Java imposant de nouvelles propriétés de sécurité a été développé. Ce document commence par les résultats de notre recherche sur les systèmes distribués, les outils de sécurité, et la sécurité de Java. Ensuite, on décrit les détails du nouveau système pour finalement faire la démonstration des améliorations qu'apporte ce système avec un exemple.
Recently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with which we could work, we studied security problems in existing distributed systems. We studied the security of Java and some tools used to secure these systems. Following our research, we developed a new Java security model, which imposed new security properties. This document begins with the results of our research in distributed systems, security tools, and Java security. Next, we go into detail about our new system to finally demonstrate the security enhancements of our system using an example.
APA, Harvard, Vancouver, ISO, and other styles
6

Dilek, Cahit Armagan. "Turkey's security policy and NATO." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, Khawar. "Pakistan's Afghanistan policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHussain.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tracy, Tommy J. "The dynamics of German security policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA299934.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 1995.
Thesis advisor(s): David S. Yost. "June 1995." Bibliography: p. 103-111. Also available online. System requirements: Adobe Acrobat Reader.
APA, Harvard, Vancouver, ISO, and other styles
9

Malone, Victor Steven. "German security policy : continuity and change." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toktomushev, Kemel. "Regime security and Kyrgyz foreign policy." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16245.

Full text
Abstract:
This thesis presents a comprehensive study of Kyrgyz foreign policy from the early 1990s to 2011. It seeks to answer the following research question: how and to what extent does regime security affect Kyrgyz foreign policymaking? In so doing, this work aims to contribute to the understanding of Central Asian politics and the foreign policy sources of weak states across the post-Soviet space. The underlying theme of this dissertation is centred on the question whether neorealist or constructivist traditions provide a more in-depth account of the erratic Kyrgyz foreign policymaking. Notwithstanding a myriad of studies on weak states, the analysis of their foreign policies is limited and mostly characterised by idiosyncratic, reductionist and great power approaches. In this respect, an interpretive and inductive framework integrative of both internal and external variables and with properly contextualised causal mechanisms may explain the international behaviour of weak states in broader and more genuine terms. Thus, the puzzle to be resolved is whether the concepts of rent-seeking and virtual politics can either substitute for or complement the New Great Game narratives in the context of weak states in general and Kyrgyzstan in particular.
APA, Harvard, Vancouver, ISO, and other styles
11

Dickson, James Carleton University Dissertation International Affairs. "Japanese security policy: change and continuity." Ottawa, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wignell, Valentina. "Security Representations in Environmental Migration Policy : A Policy Analysis on Environmental Migration Policy in Central America from a Human and State Security Perspective." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412840.

Full text
Abstract:
The main objective of this study is to analyse problem representations within national and multilateral policy concerning environmental migration in Central America. The study mainly focuses on Mexico and Costa Rica’s national legal frameworks regarding environmental migration but also draws on bilateral as well as multilateral agreements ratified by the countries. In a two-step analysis, the perspectives of human security and state security are used to identify key representations, followed by an application of Bacchi’s (2016) post-structural policy analysis tool ‘What is the problem represented to be?’, allowing for an understanding of environmental migration policy in a wider context. The results of the study show how human security characteristics are most prevalent within environmental migration policy, albeit acknowledging the implicit prevalence of state security characteristics. The study makes attributions to the understanding of the discourse and conceptualisation concerning environmental migration and recommends further studies on efficient interlinkages between human and state security-oriented policies.
APA, Harvard, Vancouver, ISO, and other styles
13

Solomon, Dianne Blitstein. "Employee and Organization Security Value Alignment Through Value Sensitive Security Policy Design." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/4.

Full text
Abstract:
Every member of the organization must be involved in proactively and consistently preventing data loss. Implementing a culture of security has proven to be a reliable method of enfranchising employees to embrace security behavior. However, it takes more than education and awareness of policies and directives to effect a culture of security. Research into organizational culture has shown that programs to promote organizational culture - and thus security behavior - are most successful when the organization's values are congruent with employee values. What has not been clear is how to integrate the security values of the organization and its employees in a manner that promotes security culture. This study extended current research related to values and security culture by applying Value Sensitive Design (VSD) methodology to the design of an end user security policy. Through VSD, employee and organizational security values were defined and integrated into the policy. In so doing, the study introduced the concept of value sensitive security policy (VSP) and identified a method for using VSPs to promote a culture of security. At a time when corporate values are playing such a public role in defining the organization, improving security by increasing employee-organization value congruence is both appealing and practical.
APA, Harvard, Vancouver, ISO, and other styles
14

Grout, Timothy J. "Norwegian security policy and new environmental challenges." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA307707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mateeva, Ralitza. "Determinants of U.S. security policy in Bulgaria." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA365585.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 1999.
"June 1999". Thesis advisor(s): David S. Yost, Rodney Kennedy-Minott. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
16

Civcik, Zeynep. "Changes And Continuities In Israeli Security Policy." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605756/index.pdf.

Full text
Abstract:
The objective of this thesis is to analyze the changes in Israeli security policy. The thesis consists of four main parts. In the first part, the factors influencing the formation of Israeli security policy such as history, religion, ideology and threat perceptions are examined. Israeli military doctrine and its offensive, defensive and deterrence strategies are identified as the most important subcomponents of the security policy. The following part analyzes the changes and continuities in Israeli threat perceptions and the implementation of the military doctrine during and after the six main wars of the War of Independence, the war against Egypt in 1956, the Six Day War, the War of Attrition, the Yom Kippur War and the War in Lebanon in 1982. In the third part, the changes in Israeli security policy during 1990s are scrutinized. With the peace process, Israel&rsquo
s existential threat perception decreased but new threat perceptions of terrorism and conventional and nuclear military buildup in the region emerged
therefore security was redefined by the Israeli political and military decision-makers. In the last part the impact of the collapse of peace process and Sharon&rsquo
s coming to power on Israeli security policy is analyzed. Sharon&rsquo
s period can be defined by offensive security strategies aiming at preventing terror which has been the top security problem since the Al Aqsa Intifada. As a result, this thesis argues that Israeli security policy did not indicate significant changes until 1990s, however during 1990s Israeli security situation and security policy changed as a response to the regional and international developments. Post-2000 period witnessed changes as well with Sharon&rsquo
s returning to offensive strategies.
APA, Harvard, Vancouver, ISO, and other styles
17

Bulgurcu, Burcu. "The antecedents of information security policy compliance." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1121.

Full text
Abstract:
Information security is one of the major challenges for organizations that critically depend on information systems to conduct their businesses. Ensuring safety of information and technology resources has become the top priority for many organizations since the consequences of failure can be devastating. Many organizations recognize that their employees, who are often considered as the weakest link in information security, can be a great resource as well to fight against information security-related risks. The key, however, is to ensure that employees comply with information security related rules and regulations of the organization. Therefore, understanding of compliance behavior of an employee is crucial for organizations to effectively leverage their human capital to strengthen their information security. This research aims at identifying antecedences of an employee’s compliance with the information security policy (ISP) of his/her organization. Specifically, we address how employees without any malicious intent choose to comply with requirements of the ISP with regards to protecting the information and technology resources of their organizations. Drawing on the Theory of Planned Behavior, we show an employee’s attitude towards compliance results in his/her intention to comply with the ISP. Of those, Benefit of Compliance and Cost of Non-Compliance are shown to be shaped by positive and negative reinforcing factors; such as, Intrinsic Benefit, Safety of Resources, Rewards and Intrinsic Cost, Vulnerability of Resources, and Sanctions, respectively. We also investigate the role of information security awareness on an employee’s ISP compliance behavior. As expected, we show that information security awareness positively influences attitude towards compliance. We also show that information security awareness positively influences the perception of reinforcing factors and negatively increases perception of the Cost of Compliance. As organizations strive to get their employees to follow their information security rules and regulations, our study sheds light on the role of an employee’s information security awareness and his/her beliefs about the rationality of compliance and non-compliance with the ISP.
APA, Harvard, Vancouver, ISO, and other styles
18

Frey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Malan, LP, and Rooyen EJ van. "Community partnerships- enhancing municipal food security policy." Journal of Public Administration, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001174.

Full text
Abstract:
Whilst many developing countries engage in sound policy processes on macro level as far as economic and social development are concerned, the day-to-day victual needs of impoverished communities also depend on sound policies as well as appropriate arrangements, which take effect in the municipal sphere. Such needs, as food security, is dependant on the establishment of effective partnership agreements among all stakeholders, including local councils, district councils as well as metropolitan councils; the actual entities that are responsible to create the enabling environment in which food security could be enhanced. In this article, issues relating to food security, partnership models, the enabling environment, and community involvement in this partnership process, are discussed briefly. Public administration practitioners should ensure they contributively involve themselves in this debate. The article concludes by emphasising the need for a proper and structured approach to be followed, of a food security policy is due to be operationalised in practice.
APA, Harvard, Vancouver, ISO, and other styles
20

Aldrawiesh, Khalid. "Security policy architecture for web services environment." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7089.

Full text
Abstract:
An enhanced observer is model that observes behaviour of a service and then automatically reports any changes in the state of the service to evaluator model. The e-observer observes the state of a service to determine whether it conforms to and obeys its intended behaviour or policy rules. E-observer techniques address most problems, govern and provide a proven solution that is re-usable in a similar context. This leads to an organisation and formalisation policy which is the engine of the e-observer model. Policies are used to refer to specific security rules for particular systems. They are derived from the goals of management that describe the desired behaviour of distributed heterogeneous systems and networks. These policies should be defended by security which has become a coherent and crucial issue. Security aims to protect these policies whenever possible. It is the first line of protection for resources or assets against events such as loss of availability, unauthorised access or modification of data. The techniques devised to protect information from intruders are general purpose in nature and, therefore, cannot directly enforce security that has no universal definition, the high degree of assurance of security properties of systems used in security-critical areas, such as business, education and financial, is usually achieved by verification. In addition, security policies express the protection requirements of a system in a precise and unambiguous form. They describe the requirements and mechanisms for securing the resources and assets between the sharing parties of a business transaction. However, Service-Oriented Computing (SOC) is a new paradigm of computing that considers "services" as fundamental elements for developing applications/solutions. SOC has many advantages that support IT to improve and increase its capabilities. SOC allows flexibility to be integrated into application development. This allows services to be provided in a highly distributed manner by Web services. Many organisations and enterprises have undertaken developments using SOC. Web services (WSs) are examples of SOC. WSs have become more powerful and sophisticated in recent years and are being used successfully for inter-operable solutions across various networks. The main benefit of web services is that they use machine-to-machine interaction. This leads initially to explore the "Quality" aspect of the services. Quality of Service (QoS) describes many techniques that prioritise one type of traffic or programme that operates across a network connection. Hence, QoS has rules to determine which requests have priority and uses these rules in order to specify their priority to real-time communications. In addition, these rules can be sophisticated and expressed as policies that constrain the behaviour of these services. The rules (policies) should be addressed and enforced by the security mechanism. Moreover, in SOC and in particular web services, services are black boxes where behaviour may be completely determined by its interaction with other services under confederation system. Therefore, we propose the design and implementation of the “behaviour of services,” which is constrained by QoS policies. We formulate and implement novel techniques for web service policy-based QoS, which leads to the development of a framework for observing services. These services interact with each other by verifying them in a formal and systematic manner. This framework can be used to specify security policies in a succinct and unambiguous manner; thus, we developed a set of rules that can be applied inductively to verify the set of traces generated by the specification of our model’s policy. These rules could be also used for verifying the functionality of the system. In order to demonstrate the protection features of information system that is able to specify and concisely describe a set of traces generated, we subsequently consider the design and management of Ponder policy language to express QoS and its associated based on criteria, such as, security. An algorithm was composed for analysing the observations that are constrained by policies, and then a prototype system for demonstrating the observation architecture within the education sector. Finally, an enforcement system was used to successfully deploy the prototype’s infrastructure over Web services in order to define an optimisation model that would capture efficiency requirements. Therefore, our assumption is, tracing and observing the communication between services and then takes the decision based on their behaviour and history. Hence, the big issue here is how do we ensure that some given security requirements are satisfied and enforced? The scenario here is under confederation system and based on the following:  System’s components are Web-services.  These components are black boxes and designed/built by various vendors.  Topology is highly changeable. Consequently, the main issues are: • The proposal, design and development of a prototype of observation system that manages security policy and its associated aspects by evaluating the outcome results via the evaluator model. • Taming the design complexity of the observation system by leaving considerable degrees of freedom for their structure and behaviour and by bestowing upon them certain characteristics, and to learn and adapt with respect to dynamically changing environments.
APA, Harvard, Vancouver, ISO, and other styles
21

Mahdi, Samiullah. "Security and foreign policy of landlocked states." Thesis, University of Massachusetts Boston, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10160222.

Full text
Abstract:

Wealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies and security measures.

APA, Harvard, Vancouver, ISO, and other styles
22

Aryanpour, Amir. "An interoperability framework for security policy languages." Thesis, University of Bedfordshire, 2015. http://hdl.handle.net/10547/603532.

Full text
Abstract:
Security policies are widely used across the IT industry in order to secure environments. Firewalls, routers, enterprise application or even operating systems like Windows and Unix are all using security policies to some extent in order to secure certain components. In order to automate enforcement of security policies, security policy languages have been introduced. Security policy languages that are classified as computer software, like many other programming languages have been revolutionised during the last decade. A number of security policy languages have been introduced in the industry in order to tackle a specific business requirements. Not to mention each of these security policy languages themselves evolved and enhanced during the last few years. Having said that, a quick research on security policy languages shows that the industry suffers from the lack of a framework for security policy languages. Such a framework would facilitate the management of security policies from an abstract point. In order to achieve that specific goal, the framework utilises an abstract security policy language that is independent of existing security policy languages yet capable of expressing policies written in those languages. Usage of interoperability framework for security policy languages as described above comes with major benefits that are categorised into two levels: short and long-term benefits. In short-term, industry and in particular multi-dimensional organisations that make use of multiple domains for different purposes would lower their security related costs by managing their security policies that are stretched across their environment and often managed locally. In the long term, usage of abstract security policy language that is independent of any existing security policy languages, gradually paves the way for standardising security policy languages. A goal that seems unreachable at this moment of time. Taking the above facts into account, the aim of this research is to introduce and develop a novel framework for security policy languages. Using such a framework would allow multi-dimensional organisations to use an abstract policy language to orchestrate all security policies from a single point, which could then be propagated across their environment. In addition, using such a framework would help security administrators to learn and use only one single, common abstract language to describe and model their environment(s).
APA, Harvard, Vancouver, ISO, and other styles
23

Gao, Zhuomin. "Conflict handling in policy-based security management." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000124.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains v, 52 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
24

Patterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.

Full text
Abstract:
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
APA, Harvard, Vancouver, ISO, and other styles
25

Gheorghe, Gabriela. "Security Policy Enforcement in Service-Oriented Middleware." Doctoral thesis, Università degli studi di Trento, 2011. https://hdl.handle.net/11572/368918.

Full text
Abstract:
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem of interest for developers and users alike. In a single machine environment, the reference monitor has been a well-researched model for enforcing policies. However, applying the same reference model in distributed applications is complicated by the presence of multiple users and concerns, and by the dynamism of the system and policies. This thesis deals with building, assessing and configuring a tool for distributed policy enforcement that acts at application runtime. In a service-oriented architecture setting, the thesis proposes a set of adaptive middleware controls able to enact policies across applications. A core contribution of this thesis is the first message-level enforcing mechanism for access and usage control policies across services. In line with the idea that no security mechanism can be perfect from the beginning, the thesis also proposes a method to assess and amend how correctly a security mechanism acts across a distributed system. Another contribution is the first method to configure an authorisation system to satisfy conflicting security and performance requirements. This approach is based on the observation that policy violations can be caused by inappropriately fitting the enforcing mechanisms onto a target system. Putting these three contributions together gives a set of middleware tools to enforce cross-service policies in a dynamic environment. These tools make the user in control over continuous and improvable security policy enforcement.
APA, Harvard, Vancouver, ISO, and other styles
26

Gheorghe, Gabriela. "Security Policy Enforcement in Service-Oriented Middleware." Doctoral thesis, University of Trento, 2011. http://eprints-phd.biblio.unitn.it/673/1/PhD-Thesis-Gabriela.pdf.

Full text
Abstract:
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem of interest for developers and users alike. In a single machine environment, the reference monitor has been a well-researched model for enforcing policies. However, applying the same reference model in distributed applications is complicated by the presence of multiple users and concerns, and by the dynamism of the system and policies. This thesis deals with building, assessing and configuring a tool for distributed policy enforcement that acts at application runtime. In a service-oriented architecture setting, the thesis proposes a set of adaptive middleware controls able to enact policies across applications. A core contribution of this thesis is the first message-level enforcing mechanism for access and usage control policies across services. In line with the idea that no security mechanism can be perfect from the beginning, the thesis also proposes a method to assess and amend how correctly a security mechanism acts across a distributed system. Another contribution is the first method to configure an authorisation system to satisfy conflicting security and performance requirements. This approach is based on the observation that policy violations can be caused by inappropriately fitting the enforcing mechanisms onto a target system. Putting these three contributions together gives a set of middleware tools to enforce cross-service policies in a dynamic environment. These tools make the user in control over continuous and improvable security policy enforcement.
APA, Harvard, Vancouver, ISO, and other styles
27

MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Full text
Abstract:
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements is not only motivated by the increased exposure, but also by the need to show compliance with respect to the many regulations promulgated by governments and commercial bodies. In modern information systems a particular area of security requirement is access control management, with security policies that describe how resources and services should be protected. These policies offer a classification of the actions on the system that distinguishes them into authorized and forbidden, depending on a variety of parameters. Given the critical role of security and their large size and complexity, concerns arise about the correctness of the policy. It is not possible anymore to rely on the security designer to have a guarantee that the policy correctly represents how the system should protect the access to resources. The research documented in this thesis investigates new approaches for the development of a collection of both methodologies and tools, which are flexible enough to help the system administrators, or generally users, in the correct management of security requirements. Due to the complexity of this topic, the research was focused on (i) enterprise and (ii) mobile scenario.
APA, Harvard, Vancouver, ISO, and other styles
28

Cowden, Daniel R. "Policy in conflict: the struggle between environmental policy and homeland security goals." Thesis, Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37605.

Full text
Abstract:
CHDS State/Local
Since the 1970s, every American president and many Congressional leaders have called for national energy independence as a top policy priority. Among many reasons the United States (U.S.) has been unable to deliver on this goal over four decades are certain environmental policies that may tend to inhibit efficiency in fuel consumption of vehicles. This study examines the unintended consequences of certain environmental policies for American homeland security. The analyses suggest that some environmental policies may have a deleterious effect on the ability of the United States to achieve a level of energy efficiency in the transportation sector that could contribute to achieving national energy security. This study suggests ways to achieve a level of sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be directly supporting terrorist organizations or, at a minimum, go toward supporting the spread of radical Islamic Salafism that is inimical to U.S. and Western interests. This inquiry examines evidence to show that Americas continuing dependence on other foreign oil, especially oil from the Middle East, is perilous to homeland security and compels limits to U.S. freedom of action in foreign affairs.
APA, Harvard, Vancouver, ISO, and other styles
29

Pinéu, Daniel Filipe Dos Ramos. "The pedagogy of security : police assistance and liberal governmentality in American foreign policy." Thesis, Aberystwyth University, 2009. http://hdl.handle.net/2160/3b368c44-fc8f-4fab-816b-64346cf8b599.

Full text
Abstract:
Since 2001, and the US response to international terrorism by launching an ill-defined and open-ended ‘Global War on Terror’, a striking debate (re)emerged within the discipline of International Relations (IR) about the global nature of American power, more specifically about the imperial character of the exercise of that power. In a discipline such as IR, forged on the heels of colonialism (cf. Schmidt 1998: 123-150, Long & Schmidt 2005), it is somewhat surprising that for several decades, little work had been produced within its mainstream on the topic of empires and imperialism1. Whatever the causes of this, two events were to change that sad state of affairs. One was the publication and unexpected success of the book Empire by Michael Hardt and Antonio Negri (Hardt & Negri 2000), which received an unusually broad array of acclaim and critique, and became something of a global phenomenon in sales, slowly achieving that rare status of a ‘theory’ best-seller. The other trigger, barely a year apart, was September 11th and its aftermath. The response of the US government under George W. Bush helped re-launch the debate, and made empire a political buzzword once again (Eakin 2002, Ricks 2001). This was compounded by the influence of the so-called neo-conservatives within his administration – some of them vocal proponents of an imperial set of policies towards the rest of the world (Boot 2001, 2002, 2003a, 2003b, 2003c; Kagan 1998). To borrow Michael Cox's ironic and apt phrase, the empire was back in town (Cox 2003).
APA, Harvard, Vancouver, ISO, and other styles
30

Hamilton, Sheilah Elizabeth. "Private security and government : a Hong Kong perspective, 1841-1941 /." Thesis, Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ahern, Bryan M. "U.S. security policy in Asia after Korean unification." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341097.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, December 1997.
"December 1997." Thesis advisor(s) Edward A. Olsen. Includes bibliographical references (p. 97-102). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Johansson, Viktor. "The Security and Development Nexus: A Policy Analysis." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-39537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Majidi, Ghani. "Fiscal policy and social security reform in Iran." Thesis, University of Essex, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Scott, David Jonathan. "Abstracting application-level security policy for ubiquitous computing." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kejdušová, Michaela. "US Security Policy towards the Iranian Nuclear Program." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162772.

Full text
Abstract:
The Iran's nuclear program makes really deep wrinkles to the United States as one of the main supporters of peace and stability in the world. Despite the fact that Iran has not showed any tests of its nuclear weapons, the USA still tends to destroy Iranian nuclear facilities to protect its national interests. The aim of the thesis is not only to analyze US foreign policy towards Iran but also to deal with the issue of the US non-intervention of Iranian territory to halt the Iranian nuclear program.
APA, Harvard, Vancouver, ISO, and other styles
36

Dyson, Philip Thomas Adrian. "The politics of German defence policy : policy leadership, Bundeswehr reform and European defence and security policy." Thesis, London School of Economics and Political Science (University of London), 2005. http://etheses.lse.ac.uk/1778/.

Full text
Abstract:
This thesis is a study of the role of policy leadership in German defence and security policy between 1990 and 2002, with particular reference to reform of the Bundeswehr. It situates this case study in the framework of a set of analytical perspectives about policy change derived from public policy theory, arguing that public policy theory has either underestimated policy leadership or failed to discriminate different leadership roles, styles and strategies. The author rejects the dominant contextualist and culturalist approach to leadership in studies of German defence and security policy in favour of an interactionist approach that stresses the dialectical interaction between policy skills and strategic context. The case study also shifts the focus in studies of policy leadership in Germany away from a preoccupation with the Chancellor to the role of ministerial and administrative leadership within the core executive. The thesis illustrates the strongly self-referential nature of Bundeswehr reform, despite adaptational pressures from Europeanisation and 'NATO-isation', and the domestic politics of base closures. It also shows how domestic macro-political arrangements predispose leadership roles in German defence and security policy towards brokerage and veto playing rather than towards entrepreneurship.
APA, Harvard, Vancouver, ISO, and other styles
37

Alwada’n, Tariq Falah. "Security for mobile grid systems." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7360.

Full text
Abstract:
Grid computing technology is used as inexpensive systems to gather and utilize computational capability. This technology enhances applications services by arranging machines and distributed resources in a single huge computational entity. A Grid is a system that has the ability to organize resources which are not under the subject of centralized domain, utilize protocols and interfaces, and supply high quality of service. The Grid should have the ability to enhance not only the systems performance and job throughput of the applications participated but also increase the utilization scale of resources by employing effective resource management methods to the huge amount of its resources. Grid mobility appears as a technology to facilitate the accomplishment of requirements for Grid jobs as well as Grid users. This idea depends on migrating or relocating jobs, data and application software among Grid nodes. However, making use of mobility technology leads to data confidentiality problems within the Grid. Data confidentiality is the protection of data from intruders’ attacks. The data confidentiality can be addressed by limiting the mobility to trusted parts of the Grid, but this solution leads to the notion of Virtual Organizations (VOs). Also as a result of mobility technology the need for a tool to organize and enforce policies while applying the mobility has been increased. To date, not enough attention has been paid to policies that deal with data movements within the Grid. Most existing Grid systems have support only limited types of policies (e.g. CPU resources). A few designs consider enforcing data policies in their architecture. Therefore, we propose a policy-managed Grid environment that addresses these issues (user-submitted policy, data policy, and multiple VOs). In this research, a new policy management tool has been introduced to solve the mobility limitation and data confidentiality especially in the case of mobile sharing and data movements within the Grid. We present a dynamic and heterogeneous policy management framework that can give a clear policy definition about the ability to move jobs, data and application software from nodes to nodes during jobs’ execution in the Grid environment. This framework supports a multi-organization environment with different domains, supports the external Grid user preferences along with enforces policies for data movements and the mobility feature within different domains. The results of our research have been evaluated using Jade simulator, which is a software framework fully implemented in Java language and allows agents to execute tasks defined according to the agent policy. The simulation results have verified that the research aims enhance the security and performance in the Grid environments. They also show enhanced control over data and services distribution and usage and present practical evidence in the form of scenario test-bed data as to the effectiveness of our architecture.
APA, Harvard, Vancouver, ISO, and other styles
38

Hong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Armstrong, John. "Food security policy in Lao PDR : an analysis of policy narratives in use." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/21471/.

Full text
Abstract:
Food security has long been a component of the global development project. Over time, extensive definitions and conceptual frameworks for food security have emerged. This thesis explores food security policy discourse in middle income, non-crisis contexts in the Global South. Taking as its research site the Southeast Asian state of the Lao People's Democratic Republic (Lao PDR), the thesis explores how food security is defined as a policy problem, and what solutions are proposed. Using an interpretive analytical approach, the research analyzes authored policy documents and constructed policy texts drawn from interviews conducted between 2011-2013 with 25 international experts to identify narratives emerging from the praxis of formal policy documents, institutional mandates and policy-in practice. The role of international expertise in shaping the national level discourse is explored in detail. Four policy narratives are identified: food security as modernization/economic growth, the smallholder narrative, the nutrition narrative, and food security as development. Particular attention is paid to the totemic status of rice in the discourse. For each narrative, a matrix of problem statements, proposed solutions, key indicators, and supporting institutions is presented. A metanarrative analysis of how these narratives intersect suggests that one of the characteristics of food security conceptually is its inclusiveness, giving it a remit across a range of sectors. This research presents food security as a valence issue, which, by virtue of its expansiveness, provides a platform on which multiple, divergent policy agenda coexist. Despite recognition among experts of serious shortcomings in both the conceptual framework and applied use in policy, this fluidity ensures that food security remains in consistent use, as both a component of national policy and as an artefact of global development discourse at the national level. Because of its continued focus on undernutrition in rural areas, the omission of issues such as overnutrition, urban food systems, and environmental degradation from the discourse, narratives in food security policy are presented as hewing to pre-existing problem statements and solutions. This renders food security an incomplete fit within the policy context of rapidly developing nations in 21st Century Southeast Asia.
APA, Harvard, Vancouver, ISO, and other styles
41

Reaves, Jeff W. "European Union Policy Against Energy Coercion: An Analysis of EU Energy Security Policy." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89671.

Full text
Abstract:
Energy Security is a necessity of modern society and as technology and society evolve so does the requirement to secure energy to provide stability for state governments. Europe is in a transition period of increasing cohesion and integration, and Russia is leveraging its natural resources to conduct disruption campaigns coupled with energy coercion tactics. The EU is developing and has implemented policies conducive of energy security that requires member-states to enhance stability through energy security both through supply and demand. The European Energy Security Strategy established a system of pillars that was designed to increase overall energy security through a multidimensional approach. The effectiveness of EU energy policy is a critical issue that must be examined in order to establish that European energy security policy can be used as an effective countermeasure to Russian energy coercion and initiatives.
Master of Arts
This study focused on energy security policies in the European Union as a countermeasure to energy coercion. While this project sought to identify the effectiveness of the EU’s current policy, there were two outcomes. First, the thesis provided strong evidence to support that EU energy security policy is an effective countermeasure against energy coercion tactics. The second outcome was a model that enables the analysis of policy implementation in Europe. Topics discussed throughout this thesis include: Russian energy strategy, EU energy security policy, energy efficiency, and policy implementation. This study ultimately focused on the European Energy Security Strategy, which established a system of pillars that was designed to increase overall energy security through a multidimensional approach. The importance lies in the effectiveness of EU energy policy as a critical issue that must be examined to establish that European energy security policy can be used as an effective countermeasure to Russian energy coercion and initiatives.
APA, Harvard, Vancouver, ISO, and other styles
42

Royds, Mollie. "Human security and Canadian foreign policy, Canada's international security dilemma in the new millenium." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64926.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Waller, Robert Patrick. "Libyan national security policy, 1969-1994 : a study in irrationality and Third World security." Thesis, King's College London (University of London), 2000. https://kclpure.kcl.ac.uk/portal/en/theses/libyan-national-security-policy-19691994--a-study-in-irrationality-and-third-world-security(48fa0467-c1f6-4161-8a3f-61ca287471d4).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Dhirathiti, Nopraenue Sajjarax. "Identity transformation and Japan's UN security policy : from the Gulf Crisis to human security." Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1141/.

Full text
Abstract:
This research uses discourse analysis to examine Japan's UN security policy after the Cold War period using three cases: the Gulf Crisis, the Cambodian peace process and the promotion of the human security policy. The key argument is that there is a need for a new IR theory-based approach that could explain foreign or security policy decision-making process and could also provide the analysis at both the domestic and the international level simultaneously. This research therefore adopts Wendt's Constructivism, along with the use of 'identity' as the key analytical platform, from which the 'recursive Constructivist model' is developed. Unlike popular literature, this research suggests that 'identity transformation' and the level of conformity between the identities projected internationally (international -role identities) and those embraced domestically (domestic-type identities) are the key factors determining Japan's foreign and security policy preferences. On the interpretation of Japan's post-Cold War security development, this research argues that it could be understood via the UN framework, and not only from the traditional perspective of the Japan-US alliance. Apart from the fact that it could be understood via the process of 'identity transformation', this research provides strong evidence and suggestions that Japan's assertive foreign and security pursuits in the post-Cold War era are the result of the nation's changing sets of ideas and beliefs on the link between 'national' and 'international' security. The original contributions of this research are two-fold. The theoretical contribution is a modification of Wendt's original framework of identity transformation into the so-called 'recursive process of identity transformation. ' The application of 'identity' and the 'recursive Constructivist model' to Japan's UN security policy in this research is significant because it is the first example among research in the field of Japanese studies to use a different analytical framework and tool in examining Japan's foreign and security policy. The model's ability to capture the intertwined process of social interactions at both the domestic and the international level is also important as it contributes to further IR theoretical development and a better understanding on Japan's foreign policy decision-making process. Also, the value-added benefit of the examination of human security policy is another vital substantive contribution, as this is the first exploration of this issue within the context of Japan's UN security policy.
APA, Harvard, Vancouver, ISO, and other styles
45

Loeppky, Rodney D. (Rodney David) Carleton University Dissertation Political Science. "The dia-eclectics of European security: a critical evaluation of European Union security policy." Ottawa, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Erforth, Benedikt. "Thinking Security: A Reflectivist Approach to France's Security Policy-Making in sub-Saharan Africa." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/369101.

Full text
Abstract:
Recent years have witnessed increased French military activism in Africa. Despite efforts to normalise its post-colonial relationship and considerable downsizing of its permanent military presence, France remains a sought-after actor in solving African security problems. Notwithstanding French decision-makers’ repeated promises that the gendarme of Africa belongs to the past, French troops have participated in nine military operations since the turn of the millennium. Against all expectations, the Hollande administration has stood out for being particularly interventionist, concerting a military intervention in Mali and deploying a peacekeeping force to the Central African Republic within two years of assuming office. The ambiguity between an interventionist policy and a disengaged discourse suggests that French military interventionism in sub-Saharan Africa no longer follows the same automaticity as in the past. The two interventions in Mali and the CAR testify to the intense ideational struggles between different belief systems that had shaped French actors’ minds and thus influenced decision-making processes and policy outcomes. Economic interests and neo-colonial continuity have been traditionally identified as the root causes of French interventionism in francophone Africa. For the past two decades the literature on French-African relations has been dominated by the so-called continuity vs. change debate, which scrutinises the presence of colonial / neo-colonial practices in the post-1990 French foreign policy. While ideational approaches to France’s African policy are not rare, few studies have engaged with the decision-making processes that produce French military interventions. Most studies focus on policy outcomes, which are rooted in static conceptualisations of ideas that are aggregated at the level of the state. Starting from these observations, the present study argues that the mere analysis of policy outcomes tells us little about the actual motivations that drive French foreign and security policy in Africa. Instead of analysing French interventionism by relying on a predefined set of explanatory variables that are juxtaposed with a series of observable outcomes in order to falsify predefined hypotheses, this thesis explains French interventionism by drawing on actors’ subjective perceptions and motivations. The study uses the actors’ own utterances to explain why French decision-makers are ready to accept the considerable risks and costs involved in guaranteeing or re-establishing the security of African countries. Adopting an actor-centred constructivist ontology, this study not only identifies ideas as core explanatory variables but also traces their emergence and subsequent development throughout decision-making processes. This approach goes beyond the dichotomous view that reduces French motivations to material interests or post-colonial ambitions. Relying on discursive material such as official statements, verbatim reports of press conferences and parliamentary hearings, policy reports, and thirty-two high-level interviews with French decision-makers, the present study narrates military intervention in Mali and the CAR from the perspective of French foreign policy elites under the Hollande Presidency. This recent and largely unexplored empirical material provides new insights into France’s foreign and defence policy. The study also demonstrates why and how the “Africa factor†still matters in France’s foreign policy considerations. The importance of Africa in France’s security policy has less to do with neo-colonial ambitions per se, than with the understanding French policy-makers have of themselves and their country. More generally, the findings show how comprehensive explanations of foreign policy can be produced by considering actors’ subjective perceptions. In so doing, the study not only explains France’s current policies in sub-Saharan Africa, but also offers insights into foreign policy decision-making processes in general, and thereby provides further evidence about how ideational factors influence the making of world politics. Keywords: France, Africa, Mali, CAR, foreign policy analysis, international security, decision-making, political psychology, constructivism
APA, Harvard, Vancouver, ISO, and other styles
47

VALENZA, FULVIO. "Modelling and Analysis of Network Security Policies." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2676486.

Full text
Abstract:
Nowadays, computers and network communications have a pervasive presence in all our daily activities. Their correct configuration in terms of security is becoming more and more complex due to the growing number and variety of services present in a network. Generally, the security configuration of a computer network is dictated by specifying the policies of the security controls (e.g. firewall, VPN gateway) in the network. This implies that the specification of the network security policies is a crucial step to avoid errors in network configuration (e.g., blocking legitimate traffic, permitting unwanted traffic or sending insecure data). In the literature, an anomaly is an incorrect policy specification that an administrator may introduce in the network. In this thesis, we indicate as policy anomaly any conflict (e.g. two triggered policy rules enforcing contradictory actions), error (e.g. a policy cannot be enforced because it requires a cryptographic algorithm not supported by the security controls) or sub-optimization (e.g. redundant policies) that may arise in the policy specification phase. Security administrators, thus, have to face the hard job of correctly specifying the policies, which requires a high level of competence. Several studies have confirmed, in fact, that many security breaches and breakdowns are attributable to administrators’ responsibilities. Several approaches have been proposed to analyze the presence of anomalies among policy rules, in order to enforce a correct security configuration. However, we have identified two limitations of such approaches. On one hand, current literature identifies only the anomalies among policies of a single security technology (i.e., IPsec, TLS), while a network is generally configured with many technologies. On the other hand, existing approaches work on a single policy type, also named domain (i.e., filtering, communication protection). Unfortunately, the complexity of real systems is not self-contained and each network security control may affect the behavior of other controls in the same network. The objective of this PhD work was to investigate novel approaches for modelling security policies and their anomalies, and formal techniques of anomaly analysis. We present in this dissertation our contributions to the current policy analysis state of the art and the achieved results. A first contribution was the definition of a new class of policy anomalies, i.e. the inter-technology anomalies, which arises in a set of policies of multiple security technologies. We provided also a formal model able to detect these new types of anomalies. One of the results achieved by applying the inter-technology analysis to the communication protection policies was to categorize twelve new types of anomalies. The second result of this activity was derived from an empirical assessment that proved the practical significance of detecting such new anomalies. The second contribution of this thesis was the definition of a newly-defined type of policy analysis, named inter-domain analysis, which identifies any anomaly that may arise among different policy domains. We improved the state of the art by proposing a possible model to detect the inter-domain anomalies, which is a generalization of the aforementioned inter-technology model. In particular, we defined the Unified Model for Policy Analysis (UMPA) to perform the inter-domain analysis by extending the analysis model applied for a single policy domain to comprehensive analysis of anomalies among many policy domains. The result of this last part of our dissertation was to improve the effectiveness of the analysis process. Thanks to the inter-domain analysis, indeed, administrators can detect in a simple and customizable way a greater set of anomalies than the sets they could detect by running individually any other model.
APA, Harvard, Vancouver, ISO, and other styles
48

Sinks, George W. "Reserve Policy for the Nuclear Age: The Development of Post-War American Reserve Policy, 1943-1955." Connect to resource, 1985. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1210099254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Emmenegger, Patrick. "Regulatory social policy : the politics of job security regulations /." Bern : Haupt, 2009. http://www.ub.unibe.ch/content/bibliotheken_sammlungen/sondersammlungen/dissen_bestellformular/index_ger.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kaya, Taylan Ozgur. "The Common Foreign And Security Policy: The European Union." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/12605077/index.pdf.

Full text
Abstract:
The objective of this thesis is to evaluate European States&rsquo
efforts to develop a coherent and effective foreign and security policy in the context of historical evolution of the CFSP. In this thesis, European States&rsquo
efforts to develop a coherent and effective foreign and security policy will be evaluated in three international political contexts. First period is Post World War II Period, second one is Post-Cold War Period and third one is Post September 11 Period. In the context of Post World War II period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy is shaped by the conditions of Cold War, Bipolar World and threat of Soviet expansionism towards Western Europe and characterized by the attempts such as European Defence Community, Fouchet Plan and European Political Cooperation. In the context of Post-Cold War period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy were shaped by ex-Yugoslavian Conflict in early 90s which brought new security challenges such as ethnic conflicts and instability in the ex-Communist States in Central and Eastern Europe. EU&rsquo
s attempts were characterized by the CFSP which was launched by the Maastricht Treaty and the CESDP which emerged after Kosovo War with Saint Malo Declaration as defence dimension of the CFSP. In the context of Post September 11 period, European States&rsquo
efforts to develop a coherent and effective foreign and security policy were shaped by global fight against international terrorism. EU&rsquo
s attempts were characterized by adoption of European Security Strategy which accepted international terrorism, organized crime and proliferation of weapons of mass destruction as key threats towards Europe and aimed at developing a coherent vision of strategic objectives, shared threat assessment for European States in order to prevent divisions among EU States in future international events. The main argument of this thesis is that in order to be an important and effective actor in global politics, EU Member States should act coherently and speak with one voice. Their influence on important international issues is greater if they act as a coherent actor rather than acting individually.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography