Narrow your search
Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Book
Guide to Attribute Based Access Control (ABAC) definition and considerations
Authors: --- --- --- --- --- et al.
Year: 2014 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This document also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.


Book
Root cause analyses of Nunn-McCurdy breaches. Vol. 2 : Excalibur artillery projectile and the Navy Enterprise Resource Planning Program : with an approach to analyzing program complexity and risk
Authors: --- --- ---
Year: 2012 Publisher: Santa Monica, CA ; RAND ; 2012

Loading...
Export citation

Choose an application

Bookmark

Abstract

Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In a companion study, the authors investigated cost overruns in four programs. The current study analyzes cost overruns in the Navy Enterprise Resource Planning (ERP) program and Excalibur (a 155mm extended-range guided artillery projectile). In addition, it develops some exploratory concepts of program risk and complexity as factors in the management of program acquisition. In spite of the cost growth associated with the ERP program, it can be considered a qualified success. The program was re-baselined in 2006 and, since then, costs have stabilized and production delays have been limited. The authors determined that the primary driver of cost increases in the Excalibur program was the change in procurement quantities, specifically, a 79 percent reduction in rounds ordered. Inaccurate cost estimates, changes in concepts and technology, and urgent operational needs also contributed to the overruns.


Book
The Nunn-McCurdy Act and defense spending overruns
Authors: ---
ISBN: 161324908X Year: 2011 Publisher: New York : Nova Science Publishers, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
802.1X-2020 - IEEE Standard for Local and Metropolitan Area Networks : Port-Based Network Access Control
Authors: ---
ISBN: 1504464400 Year: 2020 Publisher: New York. : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.


Book
U.S. policy on Yemen : hearing before the Subcommittee on Near East, South Asia, Central Asia, and Counterterrorism of the Committee on Foreign Relations, United States Senate, One Hundred Seventeenth Congress, first session, April 21, 2021.
Author:
Year: 2021 Publisher: Washington : U.S. Government Publishing Office,


Periodical
Military and security developments involving the Democratic People's Republic of Korea : annual report to Congress
Author:
Year: 2013 Publisher: [Washington, D.C.] : Office of the Secretary of Defense,


Book
Securing approval : domestic politics and multilateral authorization for war
Author:
ISBN: 1283134373 9786613134370 0226101258 Year: 2011 Publisher: Chicago ; London : University of Chicago Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Among the most momentous decisions that leaders of a state are called upon to make is whether or not to initiate warfare. How their military will fare against the opponent may be the first consideration, but not far behind are concerns about domestic political response and the reaction of the international community. Securing Approval makes clear the relationship between these two seemingly distinct concerns, demonstrating how multilateral security organizations like the UN influence foreign policy through public opinion without ever exercising direct enforcement power. While UN approval of a proposed action often bolsters public support, its refusal of endorsement may conversely send a strong signal to domestic audiences that the action will be exceedingly costly or overly aggressive. With a cogent theoretical and empirical argument, Terrence L. Chapman provides new evidence for how multilateral organizations matter in security affairs as well as a new way of thinking about the design and function of these institutions.


Book
Cryptography and Its Applications in Information Security
Authors: --- ---
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.


Book
Cryptography and Its Applications in Information Security
Authors: --- ---
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.


Book
Cryptography and Its Applications in Information Security
Authors: --- ---
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Nowadays, mankind is living in a cyber world. Modern technologies involve fast communication links between potentially billions of devices through complex networks (satellite, mobile phone, Internet, Internet of Things (IoT), etc.). The main concern posed by these entangled complex networks is their protection against passive and active attacks that could compromise public security (sabotage, espionage, cyber-terrorism) and privacy. This Special Issue “Cryptography and Its Applications in Information Security” addresses the range of problems related to the security of information in networks and multimedia communications and to bring together researchers, practitioners, and industrials interested by such questions. It consists of eight peer-reviewed papers, however easily understandable, that cover a range of subjects and applications related security of information.

Listing 1 - 10 of 14 << page
of 2
>>
Sort by