Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This document also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.
Access control --- Access control mechanism --- Access control model --- Access control policy --- Attribute based access control (ABAC) --- Authorization --- Privilege
Choose an application
Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In a companion study, the authors investigated cost overruns in four programs. The current study analyzes cost overruns in the Navy Enterprise Resource Planning (ERP) program and Excalibur (a 155mm extended-range guided artillery projectile). In addition, it develops some exploratory concepts of program risk and complexity as factors in the management of program acquisition. In spite of the cost growth associated with the ERP program, it can be considered a qualified success. The program was re-baselined in 2006 and, since then, costs have stabilized and production delays have been limited. The authors determined that the primary driver of cost increases in the Excalibur program was the change in procurement quantities, specifically, a 79 percent reduction in rounds ordered. Inaccurate cost estimates, changes in concepts and technology, and urgent operational needs also contributed to the overruns.
Defense contracts --- United States. --- Procurement --- Costs. --- United States --- Armed Forces --- Weapons systems --- Equipment --- Nunn-McCurdy amendment to the Department of Defense Authorization Act, 1982
Choose an application
Choose an application
Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.
Local area networks (Computer networks) --- Metropolitan area networks (Computer networks) --- Computer networks--Security measures --- Standards. --- IEEE Standards --- Computer networks --- Access control --- Authorization --- Media Access Protocol --- Authentication --- Security --- Security measures
Choose an application
Military assistance, American --- Humanitarian assistance, American --- National security --- Anṣār Allāh. --- United States. --- Authorization for Use of Military Force (United States) --- 2000-2099 --- Yemen (Republic) --- United States --- History --- Foreign relations
Choose an application
Nuclear weapons --- Nuclear nonproliferation --- Security, International --- United States. --- Korea (North). --- National Defense Authorization Act for Fiscal Year 2012 (United States) --- Korea (North) --- Armed Forces. --- Defenses. --- Military policy. --- Armed Forces --- Operational readiness. --- Strategic aspects.
Choose an application
Among the most momentous decisions that leaders of a state are called upon to make is whether or not to initiate warfare. How their military will fare against the opponent may be the first consideration, but not far behind are concerns about domestic political response and the reaction of the international community. Securing Approval makes clear the relationship between these two seemingly distinct concerns, demonstrating how multilateral security organizations like the UN influence foreign policy through public opinion without ever exercising direct enforcement power. While UN approval of a proposed action often bolsters public support, its refusal of endorsement may conversely send a strong signal to domestic audiences that the action will be exceedingly costly or overly aggressive. With a cogent theoretical and empirical argument, Terrence L. Chapman provides new evidence for how multilateral organizations matter in security affairs as well as a new way of thinking about the design and function of these institutions.
War, Declaration of --- International agencies. --- International agencies --- Military policy --- Security, International. --- International relations. --- Decision making. --- Influence. --- Public opinion. --- United Nations. --- politics, domestic, war, government, governing, national, warfare, state, military, soldiers, political response, international community, security organizations, un, united nations, foreign policy, public opinion, enforcement power, declaration, decision making, member states, bias, coalition, usa, american, information transmission, authorization.
Choose an application
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
Technology: general issues --- History of engineering & technology --- bit independence criterion --- bit independence --- RC4 --- stream cipher --- complexity --- chaos-based stream cipher --- SPCNG --- 3D chebyshev --- logistic --- skew-tent --- FPGA --- performance --- museum --- digital copyright management --- blockchain --- smart contract --- authorization model --- coupled map lattice --- intermittent jumping --- multi-chaos --- public key exchange --- security --- asymmetric --- asymmetric algorithm --- cryptography --- framework --- limited computational power --- computationally biased --- intrusion detection systems --- machine learning --- communication --- digital cash --- privacy --- privacy preserving --- homomorphic encryption --- federated learning --- bit independence criterion --- bit independence --- RC4 --- stream cipher --- complexity --- chaos-based stream cipher --- SPCNG --- 3D chebyshev --- logistic --- skew-tent --- FPGA --- performance --- museum --- digital copyright management --- blockchain --- smart contract --- authorization model --- coupled map lattice --- intermittent jumping --- multi-chaos --- public key exchange --- security --- asymmetric --- asymmetric algorithm --- cryptography --- framework --- limited computational power --- computationally biased --- intrusion detection systems --- machine learning --- communication --- digital cash --- privacy --- privacy preserving --- homomorphic encryption --- federated learning
Choose an application
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
Technology: general issues --- History of engineering & technology --- bit independence criterion --- bit independence --- RC4 --- stream cipher --- complexity --- chaos-based stream cipher --- SPCNG --- 3D chebyshev --- logistic --- skew-tent --- FPGA --- performance --- museum --- digital copyright management --- blockchain --- smart contract --- authorization model --- coupled map lattice --- intermittent jumping --- multi-chaos --- public key exchange --- security --- asymmetric --- asymmetric algorithm --- cryptography --- framework --- limited computational power --- computationally biased --- intrusion detection systems --- machine learning --- communication --- digital cash --- privacy --- privacy preserving --- homomorphic encryption --- federated learning --- n/a
Choose an application
Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.
bit independence criterion --- bit independence --- RC4 --- stream cipher --- complexity --- chaos-based stream cipher --- SPCNG --- 3D chebyshev --- logistic --- skew-tent --- FPGA --- performance --- museum --- digital copyright management --- blockchain --- smart contract --- authorization model --- coupled map lattice --- intermittent jumping --- multi-chaos --- public key exchange --- security --- asymmetric --- asymmetric algorithm --- cryptography --- framework --- limited computational power --- computationally biased --- intrusion detection systems --- machine learning --- communication --- digital cash --- privacy --- privacy preserving --- homomorphic encryption --- federated learning --- n/a
Listing 1 - 10 of 14 | << page >> |
Sort by
|