1,076 research outputs found
Firewall Management
Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable users to share files, exchange e-mail, and pool physical resources. Yet network connectivity can also be a risky endeavor, if the connectivity grants access to would-be intruders. The Internet is a perfect case in point. Designed for a trusted environment, many contemporary exploits are based upon vulnerabilities inherent to the protocol itself. In light of this trend, many organizations are implementing firewalls to protect their internal network from the untrusted Internet.firewall, network connection, risks, vulnerabilities
V-Model Role Engineering
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control â RBAC models. Despite the wide use of RBAC in various applications, the role engineering process is not a standardized approach. The paper aims to define a methodology and a process model for role engineeringInformation security, access control systems, role based access control systems â RBAC, engineering methodologies, security policies, access control models
Generalized evolutionary equations with imposed symmetries
The paper proposes an algorithm which could identify a general class of pdes
describing dynamical systems with similar symmetries. The way that will be
followed starts from a given group of symmetries, the determination of the
invariants and, then, of the compatible equations of evolution. The algorithm
will be exemplified by two classes of equations which describe the
Fokker-Planck model and the "backward" Kolgomorov one.Comment: 7th General Conference of the Balkan Physics Union, Published in AIP
Conference Proceedings, Vol 1203 (2009), 1172-117
Hybrid Security Policies
Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures
Mainstream and keynesism: - two doctrines, two methods, same ideas -
Taking into consideration that, in order to talk about science we need both different opinions and construtive criticism, the starting point of the issue would be: âHow do we succeed to manage in a constructive way different theories that debate the same theme- the economic crisis?â. As a concequence, the purpose of the essay is to critically analize the keynesism and the mainstream perspectives, currently used to solve the problems generated by the crisis and the economic cycle, as well as to discover both the convergence and the discrepancies between these two main economic doctrines. In the current work, it will be noted that, in order to achieve the above mentioned purpose, we will resume to schematics and abstracting the mechanisms, also to explaining the phenomenons and the informations, as well as to processing and interpreting these informations from a personal perspective, closer to the Austrian School than to the manipulating orthodoxism.Economic cycles, crisis, mainstream, keynesianism
Security Planning in IT Systems
Security planning is a necessity nowadays. Planning involves policies, controls, timetable and a continuing attention. Policies are the foundation of effective information security. Security policies challenge users to change the way they think about their own responsibility for protecting corporate information. The paper presents the compulsive elements of security planning.security planning, policy, business continuity, timetable
ENHANCING ADMINISTRATIVE SERVICES THROUGH DOCUMENT MODELS
As the European Service Directive has already been enforced, a new challenge is to ensure a fully interoperable e-Government environment at the European level. The new dimension of the public administration process raises several issues that have to be addressed in order to successfully integrate systems from various administrative models. The current Single Point of Contact implementation assures that e-Government procedures can be completed at distance and by electronic means and that the information related to national requirements and procedures will be easily accessible for service providers and service recipients. In this context, a future goal will be to ensure the means in which different PSC will be able to interoperate. This is a complex task because each PSC has its own specific particularities and deals with various document types and formats. Creating common specifications for the documents types, formats and interchange containers is a mandatory stage in achieving the desired interoperability. In this paper we focus to the process of creating a unique document model for pan-European document interchanges. The document model will be used for the communication between PSCs. The communication between PSCs and national authorities will be done independently. The document model consists on both semantic and security metadata. This document model will be properly derived from e-Government ontology. Here we are presenting the initial assumptions and architectural issues that are elicited and will be used in order to create a fully functional model. We rely on the former experience gained in engineering a Romanian PSC proof of concept and we will extend our achievements to address the PSC interoperability goal.e-Government, interoperability, e-documents ontologies
eBusiness Master Programs Overview
In the new Information Society of this new millennium the use of Information and Communication Technology (ICT) is essential for the individualâs education and training. A major buzzword nowadays, e-business represents the new trend of the business. In order to become or to remain competitive as a business in the industry or in another field of activity, all the businesses have to become "e". The e-Business Master Program from ASE Bucharest is an interdisciplinary initiative aimed to bring new perspectives to graduated young people and also to other categories of persons interested to discover the challenges of the new net-economy.e-business, individual education
- âŠ