• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 19
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 57
  • 57
  • 17
  • 14
  • 12
  • 10
  • 10
  • 10
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Program monitoring in a mandatory-results model

Reddy, Srikar Reddy 01 June 2009 (has links)
In many real enforcement systems, a security-relevant action must return a result before the application program that invoked that action can continue to execute. However, current models of runtime mechanisms do not capture this requirement on results being returned to application programs; current models are limited to reasoning about policies and enforcement in terms of actions alone, without considering the results of those actions. This thesis presents a more general model of runtime policy enforcement in which all actions return (possibly void- or unit-type) results. This mandatory-results model more accurately reflects the capabilities and limitations of real enforcement mechanisms, particularly those mechanisms that operate by monitoring function/method invocations. We analyze the new model to show that result-returning runtime monitors enforce a strict superset of the safety policies, including some nontrivial liveness policies.
12

STRATEGIC PERCEPTIONS FROM INDONESIA, MALAYSIA AND SINGAPORE 1989-1992 AND THE IMPLICATIONS FOR AUSTRALIA'S SECURITY POLICIES

PRINCE, Peter January 1993 (has links)
Indonesia, Malaysia and Singapore are of key strategic importance for Australia. These three nations form the geographic and arguably the political core of the Association of Southeast Asian Nations (ASEAN). The growing resilience of ASEAN over the last quarter of a century has been a major factor in Australia's secure strategic outlook. In addition, the Indonesia - Malaysia - Singapore triangle lies across the most feasible military approaches to Australia. Hence strategic cohesion in this triangle greatly reduces the prospect of any kind of military threat to Australia.
13

A model driven engineering approach to build secure information systems / Une approche MDE pour construire des systèmes d'information sécurisés

Nguyen, Thi Mai 13 January 2017 (has links)
Aujourd’hui, les organisations s'appuient de plus en plus sur les systèmes d'information pour collecter, manipuler et échanger leurs données. Dans ces systèmes, la sécurité joue un rôle essentiel. En effet, toute atteinte à la sécurité peut entraîner de graves conséquences, voire détruire la réputation d'une organisation. Par conséquent, des précautions suffisantes doivent être prises en compte. De plus, il est bien connu que plus tôt un problème est détecté, moins cher et plus facile il sera à corriger. L'objectif de cette thèse est de définir les politiques de sécurité depuis les premières phases de développement et d’assurer leur déploiement correct sur une infrastructure technologique donnée.Notre approche commence par spécifier un ensemble d'exigences de sécurité, i.e. des règles statiques et dynamiques, accompagnées de l'aspect fonctionnel d'un système basé sur UML (Unified Modeling Language). L'aspect fonctionnel est exprimé par un diagramme de classes UML, les exigences de sécurité statiques sont modélisées à l'aide de diagrammes de SecureUML, et les règles dynamiques sont représentées en utilisant des diagrammes d'activités sécurisées.Ensuite, nous définissons des règles de traduction pour obtenir des spécifications B à partir de ces modèles graphiques. La traduction vise à donner une sémantique précise à ces schémas permettant ainsi de prouver l'exactitude de ces modèles et de vérifier les politiques de sécurité par rapport au modèle fonctionnel correspondant en utilisant les outils AtelierB prover et ProB animator. La spécification B obtenue est affinée successivement à une implémentation de type base de données, qui est basée sur le paradigme AOP. Les affinements B sont également prouvés pour s'assurer que l’implémentation est correcte par rapport à la spécification abstraite initiale. Le programme d’AspectJ traduit permet la séparation du code lié à la sécurité sécurité du reste de l'application. Cette approche permet d’éviter la diffusion du code de l'application, et facilite ainsi le traçage et le maintien.Enfin, nous développons un outil qui génère automatiquement la spécification B à partir des modèles UML, et la dérivation d'une implémentation d'AspectJ à partir de la spécification B affinée. L'outil aide à décharger les développeurs des tâches difficiles et à améliorer la productivité du processus de développement / Nowadays, organizations rely more and more on information systems to collect, manipulate, and exchange their relevant and sensitive data. In these systems, security plays a vital role. Indeed, any security breach may cause serious consequences, even destroy an organization's reputation. Hence, sufficient precautions should be taken into account. Moreover, it is well recognized that the earlier an error is discovered, the easier and cheaper it is debugged. The objective of this thesis is to define adequate security policies since the early development phases and ensure their correct deployment on a given technological infrastructure. Our approach starts by specifying a set of security requirements, i.e. static and dynamic rules, along with the functional aspect of a system based on the Unified Modeling Language (UML). Fundamentally, the functional aspect is expressed using a UML class diagram, the static security requirements are modeled using SecureUML diagrams, and the dynamic rules are represented using secure activity diagrams. We then define translation rules to obtain B specifications from these graphical models. The translation aims at giving a precise semantics to these diagrams, thus proving the correctness of these models and verifying security policies with respect to the related functional model using the AtelierB prover and the ProB animator. The obtained B specification is successively refined to a database-like implementation based on the AOP paradigm. The B refinements are also proved to make sure that the implementation is correct with respect to the initial abstract specification. Our translated AspectJ-based program allows separating the security enforcement code from the rest of the application. This approach avoids scattering and tangling the application's code, thus it is easier to track and maintain. Finally, we develop a tool that automates the generation of the B specification from UML-based models and of the AspectJ program connected to a relational database management system from the B implementation. The tool helps disburden developers of the difficult and error-prone task and improve the productivity of the development process
14

Politiky EU a Velké Británie v oblasti vesmírné bezpečnosti z pohledu historického institucionalizmu / EU and UK space security policies through the lens of historical institutionalism

Teale, Jennifer January 2021 (has links)
The main purpose of this research is to explore the relationship between the EU and UK in terms of space defence policy developed from the viewpoint of historical institutionalism. As a research objective, it is intended to assess the nature of historical institutionalism as a concept and its applications to space defence policy. Another objective is to trace the historical development of the relationships between the EU and the UK in the space sector. Finally, this historical development is discussed through the lens of historical institutionalism. The attainment of these aims and objectives requires an optimal choice of methodology and research design. This study has been guided by the principles of interpretivism, a dominant philosophical stance in social studies. This philosophy emphasises the role of interpretations in the attainment of knowledge due to a lack of absolute truth, as according to interpretivism, the truth depends on the observer and their interpretations. In line with this philosophical stance, this research is conducted using an inductive approach, which stipulates theory development, hypothesis formulation, or new proposition statements based on observations. This contrasts with deductive testing of existing research hypotheses. The choice of an inductive approach has...
15

A Security Analysis of Smartphones

Verma, Ishita 08 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, integrity and availability of smartphone native applications to authorized parties. For this purpose, we begin with an overlook of current smartphone security standards, and explore the threats, vulnerabilities and attacks on them, that have been uncovered so far with existing popular smartphones. We also look ahead at the future uses of the smartphones, and the security threats that these newer applications would introduce. We use this knowledge to construct a mathematical model, which gives way to policies that should be followed to secure the smartphone under the model. We finally discuss existing and proposed security mechanisms that can be incorporated in the smartphone architecture to meet the set policies, and thus the set security standards.
16

The Effects of the War on Terror on U.S. and Latin American Security Policies

Giffin, Jessica L. 27 September 2007 (has links)
No description available.
17

How will the return of the Congress Party affect Indian Foreign and Security Policy?

Kundu, Apurba January 2004 (has links)
No / The 2004 Indian general elections stunned observers when, contrary to expectations, the ruling National Democratic Alliance (NDA) coalition government led by the Bharatiya Janata Party (BJP) and Prime Minister Atul Behari Vajpayee was defeated by an electoral coalition led by the Indian National Congress (INC) headed by Sonia Gandhi. A further surprise came when Gandhi declined to become India's first foreign-born prime minister, opting instead to back party stalwart Dr Manmohan Singh for this office. Dr Singh, India's first Sikh prime minister, now heads a United Progressive Alliance (UPA) coalition government headed by a cabinet containing 19 INC members and 10 members of smaller parties. Will the return to power of the INC after eight years in opposition (during three years of Left Front then five years of BJP/NDA rule) result in a shift of India's foreign and national security policies?
18

Enforcing virtualized systems security / Renforcement de la sécurité des systèmes virtualisés

Benzina, Hedi 17 December 2012 (has links)
La virtualisation est une technologie dont la popularité ne cesse d’augmenter dans le monde de l’entreprise, et ce pour l’efficacité et la facilité de gestion qu’elle apporte. Cependant, le problème majeur de cette technologie est la sécurité. Dans cette thèse, nous proposons de renforcer la sécurité des systèmes virtualisés et nous introduisons de nouvelles approches pour répondre aux différents besoins en sécurité de cette technologie et aussi aux aspects liés à à son fonctionnement et son déploiement. Nous proposons une nouvelle architecture de supervision qui permet de contrôler la totalité de la plateforme virtualisée en temps réel. L’idée est de simuler une supervision décentralisée (plusieurs postes) sur un seul poste physique. Nous étudions les avantages et les limites de cette approche et nous montrons que cette solution est incapable de réagir é à un certain nombre d’attaques nouvelles. Comme remède, nous introduisons une nouvelle procédure qui permet de sécuriser les ressources critiques d’un système virtualisé pour s’assurer que des familles d’attaques ne peuvent être exécutées en ayant accès à ces ressources. Nous introduisons une variante de LTL avec de nouveaux opérateurs de passé et nous démontrons comment des politiques de sécurité formulées à l’aide de ce langage peuvent être facilement traduites en signatures d’attaques qui sont indispensables à la détection des intrusions dans le système. Nous analysons aussi l’impact d’une communication réseau non sécurisée entre machines virtuelles sur la sécurité globale du système virtualisé. Nous proposons un modèle d’une politique de sécurité multi-niveaux qui couvre la majorité des opérations liées au réseau et qui peuvent être exécutées par une machine virtuelle. Notre modèle couvre aussi des opérations de gestion de l’infrastructure virtualisée et étudie les contraintes de sécurité qui doivent être satisfaites. / Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterprise data centers. It is most known for improving efficiency and ease of management. However, the central issue of this technology is security. We propose in this thesis to enforce the security of virtualized systems and introduce new approaches that deal with different security aspects related not only to the technology itself but also to its deployment and maintenance. We first propose a new architecture that offers real-time supervision of a complete virtualized architecture. The idea is to implement decentralized supervision on one single physical host. We study the advantages and the limits of this architecture and show that it is unable to react according to some new stealthy attacks. As a remedy, we introduce a new procedure that permits to secure the sensitive resources of a virtualized system and make sure that families of attacks can not be run at all. We introduce a variant of the LTL language with new past operators and show how policies written in this language can be easily translated to attack signatures that we use to detect attacks on the system. We also analyse the impact that an insecure network communication between virtual machines can have on the global security of the virtualized system. We propose a multilevel security policy model that covers almost all the network operations that can be performed by a virtual machine. We also deal with some management operations and introduce the related constraints that must be satisfied when an operation is performed.
19

O brasil e a segurança no cone sul no pós-guerra fria / Brazil and the post-cold war international security in the southern cone

Castillo, Juan Ignacio Albino Roman 30 January 2009 (has links)
Quando se considera a Segurança Internacional da América Latina, comprovasse a inexistência de um ator regional com excedente de poder necessário, tanto em Hard power, poderes econômico, militar, e de mobilização, como de Soft power, de liderança passiva pela persuasão da conveniência da emulação e pela convicção de resultados melhores pela cooperação com o líder ou primus inter pares. Portanto, o exercício de um Smart power, o hábil e eficaz equilíbrio dos dois poderes mencionados só poderá acontecer dentro de um condomínio de boa vontade entre os países da região. Uma Segurança Cooperativa Sustentável para América Latina, com participação seminal dos países do Cone Sul será o objeto de análise deste trabalho. O Brasil e seus vizinhos do Cone Sul, com um peso específico importante na região, devem demonstrar Vontade Nacional e capacidade operativa para facilitar a realização de consensos entre os países envolvidos para garantir uma gestão sustentável da agenda regional de segurança. Isto se torna de particular premência numa conjuntura internacional onde ameaças e desafios relativos a região carecem de qualquer prioridade global, enquanto graves crises atuais e futuras imediatas se ensejam em zonas mais críticas ao Sistema Internacional. Como conseqüência caberá aos países da sub-região exercer eficientemente a vigilância, a prevenção e a rápida solução das ameaças e desafios a segurança. / The inexistence of a regional actor with the required excess of power is observed when considering the International Security of Latin America. Both in Hard power, the economical, military and mobilization powers, and in Soft power, the passive leadership obtained by persuasion of the convenience of imitation, as well as by the conviction of better results granted from cooperation with the leader or primus inter pares. Therefore, the exercise of Smart power, the efficient balance of the afore mentioned powers, can only succeed within an ambient of good will among the nations of the region. For Latin America a Sustainable Cooperative Security, with a seminal role of the countries of the Southern Cone will be the object of analysis of this study. Brazil and its Southern Cone neighbors, with their important specific weight in the region, must make explicit their National Will and operative capacity to enable the consensuses needed among the countries involved to assure a sustainable management of the regional security agenda. These factors are of paramount importance in an international context when threats and challenges related to this region lack any global prominence, at a time when the gravest present, and immediate future, crisises happen in most critical regions of the international System. Consequently, the countries of this sub-region will be forced to efficiently manage by themselves the surveillance, the preventive measures, and the swift solution of threats and challenges to the regions security.
20

Proposta de um modelo de segurança da informação: o caso de uma aplicação no Colégio Pedro II

Oliveira, Cezar Bastos de 08 December 2016 (has links)
Submitted by Joana Azevedo (joanad@id.uff.br) on 2017-06-29T19:38:42Z No. of bitstreams: 1 Dissert Cezar Bastos de Oliveira.pdf: 2047343 bytes, checksum: 76544dd64d3e9ae36ffb755cf285fdbd (MD5) / Approved for entry into archive by Biblioteca da Escola de Engenharia (bee@ndc.uff.br) on 2017-07-10T14:35:58Z (GMT) No. of bitstreams: 1 Dissert Cezar Bastos de Oliveira.pdf: 2047343 bytes, checksum: 76544dd64d3e9ae36ffb755cf285fdbd (MD5) / Made available in DSpace on 2017-07-10T14:35:58Z (GMT). No. of bitstreams: 1 Dissert Cezar Bastos de Oliveira.pdf: 2047343 bytes, checksum: 76544dd64d3e9ae36ffb755cf285fdbd (MD5) Previous issue date: 2016-12-08 / O estudo da Ciência da Informação é um campo interdisciplinar muito importante para a sociedade, em todos os ramos do conhecimento. Nas instituições, principalmente as públicas, é importante uma boa Gestão da Informação a fim de reduzir ao mínimo os riscos dela advindos. Após os eventos de 11 de setembro de 2001 nos Estados Unidos, a necessidade de sistemas que preservem com mais segurança as informações tem sido uma preocupação constante. Assim é que se estabelecem várias regras de boas práticas para a Segurança da Informação. O presente trabalho tem o objetivo de realizar uma revisão bibliográfica e um estudo documental sobre os conceitos relacionados à Informação, Segurança da Informação, Gestão de Riscos, normas, legislação e melhores práticas existentes, utilizando a Norma NBR ISO 17799 como referência assim como modelos encontrados na literatura e de outras Instituições similares. A partir deste estudo, propor um modelo de política de segurança da informação, baseado no caso de aplicação do Colégio Pedro II, mas bem abrangente, que contemple ao máximo as especificidades das Instituições de Ensino e que possa servir de modelo para que as Instituições similares possam desenvolver, a partir dele, sua Política de Segurança. Nele apresentam-se os princípios, diretrizes básicas e responsabilidades de uma Política de Segurança, utilizando os conceitos estudados na revisão bibliográfica. / The study of Information Science is a very important interdisciplinary field for society, in all branches of knowledge. In institutions, especially public institutions, good information management is important in order to minimize the risks that arise from it. Following the events of September 11, 2001 in the United States, the need for more secure information systems has been a constant concern. This is how a number of good practice rules for information security are established. The present work has the objective of carrying out a bibliographic review and a documentary study on the concepts related to Information, Information Security, Risk Management, norms, legislation and existing best practices, using the Standard NBR ISO 17799 as reference as well as models found In literature and other similar institutions. From this study, to propose a model of information security policy, based on the case of application of the Pedro II College, but very comprehensive, that contemplates to the maximum the specificities of the Teaching Institutions and that can serve as a model so that similar Institutions To develop, from it, its Security Policy. It presents the principles, basic guidelines and responsibilities of a Security Policy, using the concepts studied in the bibliographic review.

Page generated in 0.0819 seconds