Sökning: "security levels"
Visar resultat 1 - 5 av 185 avhandlingar innehållade orden security levels.
1. Modeling and Tuning Security from a Quality of Service Perspective
Sammanfattning : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. LÄS MER
2. Building a national maritime security policy
Sammanfattning : The issue of port security raised concerns at the highest levels after the terrorist attacks on September 11, 2001 against the United States. Security threats against ports and vessels acquired a new perspective and in 2002 the International Maritime Organization (IMO) adopted amendments to the International Convention for the Safety of Life at Sea (SOLAS), 1974, introducing Chapter XI-2 - Special measures to enhance maritime security. LÄS MER
3. Parks, Policies and People : Nature Conservation Governance in Post-Socialist EU Countries
Sammanfattning : The national parks in the Carpathian Mountains along the Polish and Slovak border represent encompassing policy agendas that strive to balance biodiversity conservation and social welfare tasks. These countries have, during the last 25 years, undergone rapid transformation from socialist regimes to liberal democracies, and this transformation has affected the political, social and economic spheres. LÄS MER
4. Assessment of Enterprise Information Security : How to make it Credible and Efficient
Sammanfattning : Information is an important business asset in today’s enterprises. Hence enterprise information security is an important system quality that must be carefully managed. LÄS MER
5. Rethinking Speculative Execution from a Security Perspective
Sammanfattning : Speculative out-of-order execution is one of the fundamental building blocks of modern, high-performance processors. To maximize the utilization of the system's resources, hardware and software security checks in the speculative domain can be temporarily ignored, without affecting the correctness of the application, as long as no architectural changes are made before transitioning to the non-speculative domain. LÄS MER