Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security policie.

Thèses sur le sujet « Security policie »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Security policie ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Texte intégral
Résumé :
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements
Styles APA, Harvard, Vancouver, ISO, etc.
2

Schlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.

Texte intégral
Résumé :
Submitted by Aelson Maciera (aelsoncm@terra.com.br) on 2017-08-01T17:24:55Z No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)<br>Made available in DSp
Styles APA, Harvard, Vancouver, ISO, etc.
3

SQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.

Texte intégral
Résumé :
As praias do Rio de Janeiro são consideradas um dos espaços de lazer mais democráticos da cidade, pelo acesso gratuito e por serem frequentadas por um público heterogêneo, proveniente de diversos bairros e pertencente a diferentes camadas sociais. Contudo, a Operação Verão, uma política de segurança executada nas praias pela Polícia Militar do Estado do Rio de Janeiro e pela Guarda Municipal, pode questionar os limites desta democracia. Entre seus objetivos, a Operação Verão visa prevenir os chamados arrastões, uma modalidade coletiva de furtos e roubos, supostamente cometida por grupos de jov
Styles APA, Harvard, Vancouver, ISO, etc.
4

Lim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.

Texte intégral
Résumé :
As computer system size and complexity grow, formulating effective policies require more sophistication. There are many risk factors that need to be considered, some of which may be in conflict. Inevitably, unpredictable circumstances that demand decisions will arise during operation. In some cases an automated response may be imperative; in other cases these may be ill-advised. Manual decisions are often made that override the current policy and serve effectively to redefine it. This matter is further complicated in highly dynamic operational environments like mobile ad-hoc networks, in which
Styles APA, Harvard, Vancouver, ISO, etc.
5

Guillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.

Texte intégral
Résumé :
Esta tesis pretende demostrar la importancia de las diversas concepciones ideales (modelos) a partir de las cuáles se articulan las organizaciones y las actuaciones policiales así como sus contribuciones a la mejora del servicio con que la policía provee a los ciudadanos y las limitaciones de cada uno de ellos. La tesis parte de la idea de que los modelos policiales (y, en consecuencia, de seguridad) no son construcciones teóricas sin influencia en el día a día de las organizaciones policiales, sino todo lo contrario, que tienen influencia en los diversos ámbitos del trabajo policial. Los mode
Styles APA, Harvard, Vancouver, ISO, etc.
6

Persson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.

Texte intégral
Résumé :
Abstract Title: Building Trust: The contradiction between security and democracy in post apartheid South Africa Author: Magnus Persson Supervisor: Svante Lundberg This paper aims to investigate the contradiction between security and democracy in post-apartheid South African policing, and was executed on the field together with the South African Police Service (SAPS). The theoretical point of departure is that trust between people, in relation to the institutions of society, is fundamental to democratic development. This in combination with previous research on police reform, police academy soc
Styles APA, Harvard, Vancouver, ISO, etc.
7

Hallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.

Texte intégral
Résumé :
The security policies of mobile devices that describe how we should use these devices are often informally specified. Users have preferences for some apps over others. Some users may avoid apps which can access large amounts of their personal data, whilst others may not care. A user is unlikely to write down these policies or describe them using a formal policy language. This is unfortunate as without a formal description of the policy we cannot precisely reason about them. We cannot help users to pick the apps they want if we cannot describe their policies. Companies have mobile security poli
Styles APA, Harvard, Vancouver, ISO, etc.
8

Brooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.

Texte intégral
Résumé :
Mobile devices, given their promise of mobility with rich functionality, are being deployed with broadening use cases throughout the United States Department of Defense. All the while, massive quantities of information are stored and accessed by these devices without there being a comprehensive and specialized security policy dedicated to protecting that information. The importance of having a security policy grows as these devices start providing new capabilities and replacing many information systems we currently have deployed. Since the same device will be used in many different contexts, e
Styles APA, Harvard, Vancouver, ISO, etc.
9

Thimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.

Texte intégral
Résumé :
Research has shown that the police industry has entered into an era of homeland security. However, whether the core functions of policing have significantly changed since September 11, 2001, has been the topic of considerable debate. Using secondary data, the research identifies variables that are most influential in predicting whether Texas police chiefs understand their departments’ homeland security roles and responsibilities. The data was originally obtained in 2007 through self-administered surveys of police chiefs attending the Texas Chief Leadership Series (TPCLS) and the New Chief D
Styles APA, Harvard, Vancouver, ISO, etc.
10

Brown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Texte intégral
Résumé :
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from dete
Styles APA, Harvard, Vancouver, ISO, etc.
11

Rimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.

Texte intégral
Résumé :
This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate how SE Android can be used to improve application security. The proof-of-concept policy is then analyzed to determine if security goals are met.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Herzog, Almut. "Usable Security Policies for Runtime Environments." Doctoral thesis, Linköpings universitet, IISLAB - Laboratoriet för intelligenta informationssystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.

Texte intégral
Résumé :
The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. With Internet applications, organisations as well as end users face the risk of viruses, trojans, and denial of service attacks. Virtual machine providers are aware of these Internet security risks and provide, for example, runtime monitoring of untrusted code and access control to sensitive resources. Our wo
Styles APA, Harvard, Vancouver, ISO, etc.
13

Herzog, Almut. "Usable security policies in runtime environments /." Linköping : Department of Computer and Information Science, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Khoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.

Texte intégral
Résumé :
Le monitorage (monitoring) est une approche pour la sécurisation du code qui permet l'exécution d’un code potentiellement malicieux en observant son exécution, et en intervenant au besoin pour éviter une violation d’une politique de sécurité. Cette méthode a plusieurs applications prometteuses, notamment en ce qui a trait à la sécurisation du code mobile. Les recherches académiques sur le monitorage se sont généralement concentrées sur deux questions. La première est celle de délimiter le champ des politiques de sécurité applicables par des moniteurs opérant sous différentes contraintes. La se
Styles APA, Harvard, Vancouver, ISO, etc.
15

Hwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.

Texte intégral
Résumé :
<p> Systems such as web applications, database systems, and cloud services regulate users&rsquo; access control to sensitive resources based on security policies. Organizations often manage security policies in an ad-hoc and inconsistent manner due to a lack of budget, resources, and staff. This management could cause crucial security problems such as unauthorized access to sensitive resources. </p><p> A security policy is a set of restrictions and properties that specify how a computing system prevents information and computing resources from being used in violation of an organization&rsquo
Styles APA, Harvard, Vancouver, ISO, etc.
16

Li, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.

Texte intégral
Résumé :
Suite au développement des technologies de l'information, et en particulier au déploiement d'infrastructures telles que le Cloud Computing, de plus en plus d'applications et plateformes coopèrent en échangeant des données et des services. Cette tendance renforce l'importance de la gestion de la sécurité. Afin d'assurer la sécurité des données et de l'interaction de service une politique de sécurité doit être appliquée. Dans cette thèse, nous nous intéressons aux politiques de contrôle d'accès. Ce type de politique spécifie les privilèges de l'utilisation des ressources et est implémentée par d
Styles APA, Harvard, Vancouver, ISO, etc.
17

Giacomantonio, Christopher Joseph. "Policing integration : the inter- and intra-organizational coordination of police work." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:4c85a7d4-4475-42a0-9fa1-226baaca43fc.

Texte intégral
Résumé :
The thesis examines the coordination of public police organizations in an intra-national setting through interviews and observations with police officers and managers in multiple organizations in the Lower Mainland, BC, Canada, alongside documentary analysis of local, national and provincial law, policy and protocols relating to coordination. It produces a qualitative and inductive analysis of how police coordinate both within and between agencies, examining ‘interstices’ between police units and using recent ‘integration’ initiatives between public police organizations in the Lower Mainland a
Styles APA, Harvard, Vancouver, ISO, etc.
18

Martinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.

Texte intégral
Résumé :
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed by a number of heterogeneous subsystems, each subsystem plays a key role in the global system security. For the specific case of access-control, access-control policies may be found in several components (databases, networksand applications) all, supposedly, working together. Nevertheless since most times these policies have been manually implemented a
Styles APA, Harvard, Vancouver, ISO, etc.
19

Yalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.

Texte intégral
Résumé :
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities
Styles APA, Harvard, Vancouver, ISO, etc.
20

El, Maarabani Mazen. "Verification and test of interoperability security policies." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00717602.

Texte intégral
Résumé :
Nowadays, there is an increasing need for interaction in business community. In such context, organizations collaborate with each other in order to achieve a common goal. In such environment, each organization has to design and implement an interoperability security policy. This policy has two objectives: (i) it specifies the information or the resources to be shared during the collaboration and (ii) it define the privileges of the organizations' users. To guarantee a certain level of security, it is mandatory to check whether the organizations' information systems behave as required by the in
Styles APA, Harvard, Vancouver, ISO, etc.
21

Martins, Francisco. "Controlling Security Policies in a Distributed Environment." Doctoral thesis, Department of Informatics, University of Lisbon, 2006. http://hdl.handle.net/10451/14314.

Texte intégral
Résumé :
This thesis proposes a typing discipline to control the migration of code in a distributed, mobile environment. Our approach is to express security policies as types, to characterise security faults as typing errors, and to use a type system to statically enforce a given security policy. We prove a type safety result that ensures that well-typed programs do not violate the prescribed security policy. We start by analysing a simple, yet non-trivial, approach to control the access to resources in a concurrent language (the $\pi-$calculus). In the concurrent framework we study the control of acti
Styles APA, Harvard, Vancouver, ISO, etc.
22

VALENZA, FULVIO. "Modelling and Analysis of Network Security Policies." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2676486.

Texte intégral
Résumé :
Nowadays, computers and network communications have a pervasive presence in all our daily activities. Their correct configuration in terms of security is becoming more and more complex due to the growing number and variety of services present in a network. Generally, the security configuration of a computer network is dictated by specifying the policies of the security controls (e.g. firewall, VPN gateway) in the network. This implies that the specification of the network security policies is a crucial step to avoid errors in network configuration (e.g., blocking legitimate traffic, permitt
Styles APA, Harvard, Vancouver, ISO, etc.
23

Ngo, Nguyen Nhat Minh. "A Programmable Enforcement Framework for Security Policies." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368864.

Texte intégral
Résumé :
This thesis proposes the MAP-REDUCE framework, a programmable framework, that can be used to construct enforcement mechanisms of different security policies. The framework is based on the idea of secure multi-execution in which multiple copies of the controlled program are executed. In order to construct an enforcement mechanism of a policy, users have to write a MAP program and a REDUCE program to control inputs and outputs of executions of these copies. This thesis illustrates the framework by presenting enforcement mechanisms of non-interference (from Devriese and Piessens), non-deducibilit
Styles APA, Harvard, Vancouver, ISO, etc.
24

Ngo, Nguyen Nhat Minh. "A Programmable Enforcement Framework for Security Policies." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1793/1/MinhNgo-Thesis.pdf.

Texte intégral
Résumé :
This thesis proposes the MAP-REDUCE framework, a programmable framework, that can be used to construct enforcement mechanisms of different security policies. The framework is based on the idea of secure multi-execution in which multiple copies of the controlled program are executed. In order to construct an enforcement mechanism of a policy, users have to write a MAP program and a REDUCE program to control inputs and outputs of executions of these copies. This thesis illustrates the framework by presenting enforcement mechanisms of non-interference (from Devriese and Piessens), non-deducibilit
Styles APA, Harvard, Vancouver, ISO, etc.
25

Marhia, Natasha. "Everyday (in)security/(re)securing the everyday : gender, policing and violence against women in Delhi." Thesis, London School of Economics and Political Science (University of London), 2012. http://etheses.lse.ac.uk/759/.

Texte intégral
Résumé :
This thesis contributes to the literature seeking to reconceptualise human security from a critical feminist perspective. It argues that security is a field of power, implicated in context-specific ways in the (re)production of gendered violences, and that human security must account for how such violences are (re)produced in and through the everyday. It explores how socially and historically embedded security institutions, discourses and practices are implicated in ‘the (violent) reproduction of gender’ (Shepherd 2008), taking as a case study Delhi Police’s initiatives to address violence/cri
Styles APA, Harvard, Vancouver, ISO, etc.
26

Michael, Deborah Francis. "A sense of security? : the ideology and accountability of private security officers." Thesis, London School of Economics and Political Science (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271286.

Texte intégral
Résumé :
Policing in the UK is undergoing fundamental transformation. In an emerging 'mixed economy' of social control, policing has become a complex assortment of public and private inputs. As non-emergency policing has gradually shifted away from the Home Office police service monopoly, the private security industry is acquiiing a much wider role. This small-scale qualitative study provides an original insight into the ideology and accountability of 50 security officers working for three of the market leaders in the manned-guarding industry. Particular attention is paid to their attitudes towards: th
Styles APA, Harvard, Vancouver, ISO, etc.
27

Saboya, PÃmela Costa Landim. "As mudanÃas na formaÃÃo do policial militar do Cearà no contexto da seguranÃa pÃblica." Universidade Federal do CearÃ, 2017. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=19094.

Texte intégral
Résumé :
nÃo hÃ<br>O presente trabalho investiga a evoluÃÃo do conhecimento realizado nas Academias de PolÃcias com uma preocupaÃÃo em mostrar quais fatores influenciaram as mudanÃas para se chegar ao atual modelo de formaÃÃo implementado na Academia Estadual de SeguranÃa PÃblica do Estado do CearÃ. Tratou-se de uma pesquisa qualitativa, com carÃter comparativo, pautada nos referenciais da sociologia e das mudanÃas curriculares dos cursos de formaÃÃo do policial militar do CearÃ. Como procedimentos metodolÃgicos foram utilizados principalmente pesquisas bibliogrÃficas sobre a seguranÃa pÃblica, a violÃ
Styles APA, Harvard, Vancouver, ISO, etc.
28

Graham, Scott W. Mills Stephen E. "Monitoring information systems to enforce computer security policies /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369434.

Texte intégral
Résumé :
Thesis (M.S. in Systems Engineering) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Vicente Garcia. Includes bibliographical references (p. 123-124). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Singh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.

Texte intégral
Résumé :
The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a result, end-to-end security for web access has been hindered by the limitations of current web security policies and by the lack of systems that enable effective enforcement of policies. The focus of this dissertation is on how new tools and frameworks may be designed to aid the protection of web systems by acting as policy specification and enforcement points. In particular, we develop a set of policies and frameworks for three web players--the
Styles APA, Harvard, Vancouver, ISO, etc.
30

Weikard, Hans-Peter. "Industrial policies and social security : investigating the links." Universität Potsdam, 1997. http://opus.kobv.de/ubp/volltexte/2010/4876/.

Texte intégral
Résumé :
This paper opens a series of discussion papers which report about the findings of a research project within the Phare-ACE Programme of the European Union. We, a group of Bulgarian, German, Greek, Polish and Scottish economists and agricultural economists, undertake this research to provide An Integrated Analysis of Industrial Policies and Social Security Systems in Countries in Transition.1 This paper outlines the basic motivation for such study.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Graham, Scott W., and Stephen E. Mills. "Monitoring information systems to enforce computer security policies." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/8698.

Texte intégral
Résumé :
Many computer security policies are written relatively vaguely. In many ways this is intentional to allow for easier access to all the functionality of the computer network. However, too much leeway allows users, without a need to access many of the network functions, the ability to execute functions that might cause harm to the system or provide access to information they have no need to see. With this in mind, this paper takes a look at computer security. We start with a brief history of computer security and continue with a look at internal security. Since our focus is on computer misuse an
Styles APA, Harvard, Vancouver, ISO, etc.
32

Alzahrani, Ali Mousa G. "Efficient enforcement of security policies in distributed systems." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9029.

Texte intégral
Résumé :
Policy-based management (PBM) is an adaptable security policy mechanism in information systems (IS) that confirm only authorised users can access resources. A few decades ago, the traditional PBM has focused on closed systems, where enforcement mechanisms are trusted by system administrators who define access control policies. Most of current work on the PBM systems focuses on designing a centralised policy decision point (PDP), the component that evaluates an access request against a policy and reports the decision back, which can have performance and resilience drawbacks. Performance and res
Styles APA, Harvard, Vancouver, ISO, etc.
33

Sui, Guang Ye. "Formal Enforcement of Security Policies : An Algebraic Approach." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26466.

Texte intégral
Résumé :
La sécurité des systèmes d’information est l’une des préoccupations les plus importantes du domaine de la science informatique d’aujourd’hui. Les particuliers et les entreprises sont de plus en plus touchés par des failles de sécurité et des milliards de dollars ont été perdus en raison de cyberattaques. Cette thèse présente une approche formelle basée sur la réécriture de programmes permettant d’appliquer automatiquement des politiques de sécurité sur des programmes non sécuritaires. Pour un programme P et une politique de sécurité Q, nous générons un autre programme P’ qui respecte une polit
Styles APA, Harvard, Vancouver, ISO, etc.
34

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/368624.

Texte intégral
Résumé :
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
Styles APA, Harvard, Vancouver, ISO, etc.
35

Truong, Anh. "Efficient Automated Security Analysis of Complex Authorization Policies." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1438/1/PhD-Thesis_AnhTuanTruong.pdf.

Texte intégral
Résumé :
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designe
Styles APA, Harvard, Vancouver, ISO, etc.
36

Steffinlongo, Enrico <1987&gt. "Efficient security analysis of administrative access control policies." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12917.

Texte intégral
Résumé :
In recent years access control has been a crucial aspect of computer systems, since it is the component responsible for giving users specific permissions enforcing a administrator-defined policy. This lead to the formation of a wide literature proposing and implementing access control models reflecting different system perspectives. Moreover, many analysis techniques have been developed with special attention to scalability, since many security properties have been proved hard to verify. In this setting the presented work provides two main contributions. In the first, we study the security of
Styles APA, Harvard, Vancouver, ISO, etc.
37

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Desilets-Bixler, Nicole L. "Security in transition : police reform in El Salvador and South Africa." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://handle.dtic.mil/100.2/ADA404711.

Texte intégral
Résumé :
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2002.<br>Thesis advisor(s): Jeanne Giraldo, Maria Rasmussen. Includes bibliographical references. Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Doyle, Maria. "FEELINGS OF SAFETY : Feelings of Safety In The Presence Of the Police, Security Guards and Police Volunteers." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35885.

Texte intégral
Résumé :
Uniformed presences are thought to create feelings of safety in people. However, do different uniformed people contribute to the same amount of safety and are there differences dependent on the situation? The present study examined the association between various types of uniformed presence and people’s feelings of safety through a questionnaire among 352 respondents (18-86 years) (49.1 % women). The questionnaire contained pictures of relatively safe and unsafe situations with or without uniformed presence. The respondents estimated how safe they thought they would feel in these situations wi
Styles APA, Harvard, Vancouver, ISO, etc.
40

Menzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.

Texte intégral
Résumé :
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide a technical foundation to implement this paradigm on the basis of XML-messaging. However, the enhanced flexibility of message-based systems comes along with new threats and risks. To face these issues, a variety of security mechanisms and approaches is supported by the Web Service specifications. The usage of these security mechanisms and protocols is configured by stating security requirements in security policies.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Plotkin, Lori A. "Kuwait, 1979-1991 : problems and policies for internal security." Thesis, University of Oxford, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288970.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Hassan, S. M. A. "Food security and regional development policies in arid Sudan." Thesis, Swansea University, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637243.

Texte intégral
Résumé :
Food is a need for all communities. Food security and development planning is a current issue of investigation in the Third World, particularly in Sub-Saharan Africa, due to recent famines. In these countries, development planning has been criticized on the grounds of its alienation from the local environments and its failure to achieve food security for the growing population. This thesis investigates the food problem in arid Sudan and examines the situation in the White Nile region as a suitable case study. The investigation of this problem was on indicators, such as food production, food ma
Styles APA, Harvard, Vancouver, ISO, etc.
43

Toje, Asle. "American influence on European Union security policies, 1998-2004." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612838.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Lomsak, Daniel. "Toward More Composable Software-Security Policies: Tools and Techniques." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4531.

Texte intégral
Résumé :
Complex software-security policies are dicult to specify, understand, and update. The same is true for complex software in general, but while many tools and techniques exist for decomposing complex general software into simpler reusable modules (packages, classes, functions, aspects, etc.), few tools exist for decomposing complex security policies into simpler reusable modules. The tools that do exist for modularizing policies either encapsulate entire policies as atomic modules that cannot be decomposed or allow ne-grained policy modularization but require expertise to use correctly. This dis
Styles APA, Harvard, Vancouver, ISO, etc.
45

Mallios, Ioannis. "Probabilistic-Cost Enforcement of Security Policies in Distributed Systems." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/736.

Texte intégral
Résumé :
Computer and network security has become of paramount importance in our everyday lives. Cyber attacks can lead to a wide range of undesirable situations ranging from breaches of personal information and confidential data to loss of human lives. One way to protect computer and network systems is through the use of technical (i.e., software and hardware) security mechanisms, such as firewalls and Intrusion Detection Systems (IDSs). Previous work has introduced formal frameworks that can be used to model such technical security mechanisms. Such formal frameworks help us: (1) understand the fundam
Styles APA, Harvard, Vancouver, ISO, etc.
46

Schwan, Matthias. "Specification and verification of security policies for smart cards." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2008. http://dx.doi.org/10.18452/15767.

Texte intégral
Résumé :
Chipkarten sind ein fester Bestandteil unseres täglichen Lebens, das immer stärker von der Zuverlässigkeit derartiger Sicherheitssysteme abhängt, zum Beispiel Bezahlkarten, elektronische Gesundheitskarten oder Ausweisdokumente. Eine Sicherheitspolitik beschreibt die wichtigsten Sicherheitsziele und Sicherheitsfunktionen eines Systems und bildet die Grundlage für dessen zuverlässige Entwicklung. In der Arbeit konzentrieren wir uns auf multi-applikative Chipkartenbetriebssysteme und betrachten neue zusätzliche Sicherheitsziele, die dem Schutz der Kartenanwendungen dienen. Da die Qualität des
Styles APA, Harvard, Vancouver, ISO, etc.
47

Hanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.

Texte intégral
Résumé :
This research seeks to derive and examine a multidimensional definition of information security awareness, investigate its antecedents, and analyze its effects on compliance with organizational information security policies. The above research goals are tested through the theoretical lens of technology threat avoidance theory and protection motivation theory. Information security awareness is defined as a second-order construct composed of the elements of threat and coping appraisals supplemented by the responsibilities construct to account for organizational environment. The study is executed
Styles APA, Harvard, Vancouver, ISO, etc.
48

Oliveira, Nathalia Pereira de. "Policiais Violados, policiais violentos: uma análise da formação policial." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/6189.

Texte intégral
Résumé :
Submitted by Cássia Santos (cassia.bcufg@gmail.com) on 2016-09-12T14:43:32Z No. of bitstreams: 2 Dissertação - Nathalia Pereira de Oliveira - 2016.pdf: 4172415 bytes, checksum: faf8d0f5decce7bd59ee91fad742b22d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)<br>Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-09-12T15:51:41Z (GMT) No. of bitstreams: 2 Dissertação - Nathalia Pereira de Oliveira - 2016.pdf: 4172415 bytes, checksum: faf8d0f5decce7bd59ee91fad742b22d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (M
Styles APA, Harvard, Vancouver, ISO, etc.
49

Lee, Thomas F. "A new role for local police in radiological security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FLee.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.<br>Thesis Advisor(s): Brannan, David ; Simeral, Robert. "September 2007." Description based on title screen as viewed on October 22, 2007. Includes bibliographical references (p. 65-72). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Gerônimo, Gislene Donizetti. "Segurança pública: dever do Estado: garantia do exercício da cidadania." Universidade Presbiteriana Mackenzie, 2011. http://tede.mackenzie.br/jspui/handle/tede/1028.

Texte intégral
Résumé :
Made available in DSpace on 2016-03-15T19:33:46Z (GMT). No. of bitstreams: 1 Gislene Donizetti Geronimo.pdf: 433501 bytes, checksum: 8be5695f49164c369a208d10adb10752 (MD5) Previous issue date: 2011-08-25<br>The Modern State appeared as a new type of State. Characterized for the sovereign power, it was instituted to assure the order and the peace in the State community, as well as providing a legal communitarian order in which the individuals could exert their basic rights and lived with dignity. In this way, the State it is constructed to guarantee to the individual the security to live in s
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!