The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security policy is the core to ensure the system operating safely, security policy conflict will cause the system to suffer a security threaten, which even make system crash, therefore security policy conflict detection is particularly important. This paper researches the type of intra-node security policy conflict detection, analyses the complexity of algorithm of security policy conflict detection,...
Policy specification is a difficulty in policy-based management recently. This paper analyzes the common policy specification approaches and summarizes the definition of policy in the references. Then, we propose the concept of policy primitive language by defining that policy is a set of policy elements. Meanwhile, formalizing policy and policy primitive language, we prove the applicability of specifying...
Project teams are becoming more and more crucial to the innovations of technology and products. Studies should be delved to make the team members both work effectively and achieve the expected goal when getting them together. In this paper, by using Synergetic, the author analyses the order parameters and relationship between them, which affect the performance of a team. It is concluded that any organization...
Policy monitoring is one of the most indispensable parts in the security policy management, which can improve the reliability of the system and offer the references to the other audit after some security incidentspsila occurrences. In this paper, the policy states are divided into several types. Also the policy states transition model based on the Mealy automata is promoted, which provides the objects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.