• Aucun résultat trouvé

Security management

Computation of worst operation scenarios under uncertainty for static security management

Computation of worst operation scenarios under uncertainty for static security management

... static security management Florin Capitanescu and Louis Wehenkel Abstract—This paper deals with day-ahead static security assessment with respect to a postulated set of contingencies while taking ...

9

Security management under uncertainty: From day-ahead planning to intraday operation

Security management under uncertainty: From day-ahead planning to intraday operation

... for security management by Transmission System Operators in the context of day-ahead planning and intraday ...where security is constrained by power flow ...

8

Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations

Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations

... the security situation is then mandatory to launch proper security reactions in response to cybersecurity ...attacks. Security Incident and Event Management solutions are deployed within ...

8

Whither probabilistic security management for real-time operation of power systems ?

Whither probabilistic security management for real-time operation of power systems ?

... Line 1/Control Fail. 20500 2500 18000 1) Severity Controlled Approach within Area A: The scope of operator A is to optimize the value of (7) while main- taining the potential severity levels within area A below e5625 ...

17

dynSMAUG: A Dynamic Security Management Framework Driven by Situations

dynSMAUG: A Dynamic Security Management Framework Driven by Situations

... VI. C ONCLUSION We presented in this article, dynSMAUG, a framework that aims at making management of security more flexible and adaptive. The specificity of our approach consists in considering the concept ...

9

A situation-driven framework for dynamic security management

A situation-driven framework for dynamic security management

... dynamic security management framework where security policies are specified accord- ing to ...dynamic security measures, are closer to busi- ness and simplify the policy life cycle ...

12

Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations

Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations

... the security situation is then mandatory to launch proper security reactions in response to cybersecurity ...attacks. Security Incident and Event Management solutions are deployed within ...

7

Policy-based Privacy and Security Management for Collaborative E-education Systems

Policy-based Privacy and Security Management for Collaborative E-education Systems

... and security management in the collaborative e- education ...and security for e-learning ...and security management not only for e- education systems but also other distributed network ...

7

A situation-driven framework for dynamic security management

A situation-driven framework for dynamic security management

... dynamic security management framework where security policies are specified accord- ing to ...dynamic security measures, are closer to busi- ness and simplify the policy life cycle ...

11

Rearticulating Return of experience:  Towards a participatory and flexible REX Information Infrastructure for safety and security management

Rearticulating Return of experience: Towards a participatory and flexible REX Information Infrastructure for safety and security management

... and security-related crises in order to increase reflective practices and stimulate a learning ...crisis management actors regularly call for the establishment of such an information ...

1

For a communicational analysis of international management standards in societal security

For a communicational analysis of international management standards in societal security

... within management science and ...information security management standards within the international context of societal security – has led us to design an analytical framework that will allow ...

5

Automatic reconstruction and analysis of security policies from deployed security components

Automatic reconstruction and analysis of security policies from deployed security components

... 7.2.3 Permissions Permissions are the right of performing actions on the WCMS. They can define constraints that restrict the Permission to execute the corresponding action only when certain conditions hold. In our ...

157

Security for wireless communications

Security for wireless communications

... communication security is divided into two ...The security of this new GGH system is highlighted through a security analysis that reviews all known attacks on GGH ...

183

Security Transitions

Security Transitions

... the security transition we study, rebel forces strategically reduced violence levels until after foreign troops withdrew and the political costs of conducting another intervention were prohibitive ( Smith , 2014 ...

79

Security requirements analysis based on security and domain ontologies

Security requirements analysis based on security and domain ontologies

... . Security is a multi-faceted problem; it is as much about understanding the domain in which systems operate as it is about the systems ...developing security facilities such as encryption, identity ...

4

Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey

Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey

... on security primitives delivered by the host) leveraging code-based or rule-based defense to improve their confi- dence in their ...own security tools (based on the LSM framework or not) ex- posed by the ...

7

Using Security and Domain ontologies for Security Requirements Analysis

Using Security and Domain ontologies for Security Requirements Analysis

... The 8th IEEE International Workshop on Security, Trust and Privacy for Software Applications in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software & Appli[r] ...

8

Aspectizing JavaScript Security

Aspectizing JavaScript Security

... a security policy expressed as sets of pairs (x, •) or (•, x) meaning that the value of the variable x should not flow to or from a “hole” (a dynamically loaded ...

6

RFID Security and Privacy

RFID Security and Privacy

... and security issues if this tag is going to be carried by ...3. Security measures have also to be taken to protect personal information on RFID tags against information leak which could lead to identity ...

15

Security Exposures with Simple Network Management Protocol

Security Exposures with Simple Network Management Protocol

... Attack using Implementation Errors There is another and simpler way for an intruder to gain access to many SNMP agents. The technique involves the use of hidden manufacturer passwords. This security hole has been ...

8

Show all 4212 documents...

Sujets connexes