Search Results - "security"

  1. 41
  2. 42

    Chapter 4 Albania Moving from Security Receiver to Security Provider by Jano, Dorian

    Published 2023
    Subjects: “…Albania, NATO, EU, security policy, domestic vulnerabilities…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  3. 43
  4. 44
  5. 45

    Chapter 4 Albania Moving from Security Receiver to Security Provider by Jano, Dorian

    Published 2023
    Subjects: “…Albania, NATO, EU, security policy, domestic vulnerabilities…”
    OAPEN Library: download the publication
    OAPEN Library: description of the publication
    Electronic Book Chapter
  6. 46
  7. 47
  8. 48

    Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings /

    Published 2019
    Table of Contents: “…Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.…”
    Link to Metadata
    Electronic eBook
  9. 49

    Security in an Interconnected World A Strategic Vision for Defence Policy /

    Published 2020
    Subjects: “…Security systems.…”
    Link to Metadata
    Electronic eBook
  10. 50

    The Coupling of Safety and Security Exploring Interrelations in Theory and Practice /

    Published 2020
    Table of Contents: “…1. Safety and Security: The Challenges of Bringing them Together -- 2. …”
    Link to Metadata
    Electronic eBook
  11. 51

    Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /

    Published 2018
    Table of Contents: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
    Link to Metadata
    Electronic eBook
  12. 52

    Computer Systems Security Planning for Success by Tolboom, Ryan

    Table of Contents: “…Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. …”
    Access online version
    Electronic eBook
  13. 53
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58

    Greenland in Arctic Security (De)securitization Dynamics under Climatic Thaw and Geopolitical Freeze

    Published 2024
    Subjects: “…Greenland, security, hard security, soft security, borders, security policies, securitization, desecuritization, climate change, geopolitics, Arctic, Greenland identity, security dynamics, territorial borders, arctic security, identity politics, postcolonialism, great power competition…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  19. 59

    Security. Cooperation. Governance. The Canada-United States Open Border Paradox

    Published 2023
    Subjects: “…border, security, interdependence, policy, Canada, United States, North America, states, provinces, globalization, cross-border, coordination, cooperation, collaboration, regulation, trade, regime, technology, migration, region, sector, scale, economy, maritime, intermodal, Great Lakes, Cascadia, Maritimes, Prairies, Midwest, Atlantic, Pacific, automotive, commodity, agriculture, food, bilateral, binational, multilevel governance, federalism, federation, federal system, open border, national security, terrorism, critical infrastructure, drugs, human security, public safety, homeland security, human smuggling, organized crime, food safety, cyber, sabotage, environment, British Columbia, Alberta, Saskatchewan, Manitoba, Ontario, Quebec, New Brunswick, Nova Scotia, Michigan, New York, Washington…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  20. 60

    Nordic Societal Security Convergence and Divergence

    Published 2021
    Subjects: “…security…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter