Articles with "security policies" as a keyword



Photo from wikipedia

Changing Security Policies in Postwar Japan: The Political Biography of Japanese Defense Minister Sakata Michita

Sign Up to like & get
recommendations!
Published in 2018 at "Japanese Studies"

DOI: 10.1080/10371397.2018.1518115

Abstract: Changing Security Policies in Postwar Japan: The Political Biography of Japanese Defense Minister Sakata Michita, Sase Masamori (Translated and edited by Robert D. Eldridgewith Graham B. Leonard), Lanham: Lexington Books, 2018, xix, 162 pp., +… read more here.

Keywords: changing security; postwar japan; security policies; japan political ... See more keywords
Photo from wikipedia

The impact of social security policies on farmland reallocation in rural China

Sign Up to like & get
recommendations!
Published in 2018 at "China Agricultural Economic Review"

DOI: 10.1108/caer-12-2016-0199

Abstract: Purpose The purpose of this paper is to explore the causality between social security policies and farmland reallocation in rural China. Design/methodology/approach It quantitatively analyzes the impact of each ongoing social security policy on farmland… read more here.

Keywords: farmland reallocation; security policies; security; china ... See more keywords
Photo by scottwebb from unsplash

Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2960316

Abstract: Internet of Things (IoT) ecosystems are recently experiencing a significant growth in complexity. Most IoT applications in domains like healthcare, industry, automotive, and smart energy are composed of several interconnected subsystems that produce, collect, process,… read more here.

Keywords: composite services; security policies; validation security; security ... See more keywords
Photo by scottwebb from unsplash

Modeling XACML Security Policies Using Graph Databases

Sign Up to like & get
recommendations!
Published in 2017 at "IT Professional"

DOI: 10.1109/mitp.2017.4241465

Abstract: XACML is a precise and complete access control language that defines an architecture to deploy access control services in a fine-grained way. However, when the number and complexity of policies increases, XACML suffers from performance… read more here.

Keywords: xacml security; modeling xacml; security policies; security ... See more keywords
Photo by scottwebb from unsplash

Voting for Law and Order: Evidence From a Survey Experiment in Mexico

Sign Up to like & get
recommendations!
Published in 2023 at "Comparative Political Studies"

DOI: 10.1177/00104140231169035

Abstract: In this article, we examine the demand-and-supply dynamic of security policies. We argue there are two informational shortcuts through which voters process policy alternatives and choose among them: (1) their own personal experiences with violence… read more here.

Keywords: security policies; survey; survey experiment; law order ... See more keywords