1,342 research outputs found
Firewall Management
Network connectivity can be both a blessing and a curse. On the one hand, network connectivity can enable users to share files, exchange e-mail, and pool physical resources. Yet network connectivity can also be a risky endeavor, if the connectivity grants access to would-be intruders. The Internet is a perfect case in point. Designed for a trusted environment, many contemporary exploits are based upon vulnerabilities inherent to the protocol itself. In light of this trend, many organizations are implementing firewalls to protect their internal network from the untrusted Internet.firewall, network connection, risks, vulnerabilities
V-Model Role Engineering
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models. Despite the wide use of RBAC in various applications, the role engineering process is not a standardized approach. The paper aims to define a methodology and a process model for role engineeringInformation security, access control systems, role based access control systems – RBAC, engineering methodologies, security policies, access control models
Generalized evolutionary equations with imposed symmetries
The paper proposes an algorithm which could identify a general class of pdes
describing dynamical systems with similar symmetries. The way that will be
followed starts from a given group of symmetries, the determination of the
invariants and, then, of the compatible equations of evolution. The algorithm
will be exemplified by two classes of equations which describe the
Fokker-Planck model and the "backward" Kolgomorov one.Comment: 7th General Conference of the Balkan Physics Union, Published in AIP
Conference Proceedings, Vol 1203 (2009), 1172-117
Security Planning in IT Systems
Security planning is a necessity nowadays. Planning involves policies, controls, timetable and a continuing attention. Policies are the foundation of effective information security. Security policies challenge users to change the way they think about their own responsibility for protecting corporate information. The paper presents the compulsive elements of security planning.security planning, policy, business continuity, timetable
Mainstream and keynesism: - two doctrines, two methods, same ideas -
Taking into consideration that, in order to talk about science we need both different opinions and construtive criticism, the starting point of the issue would be: “How do we succeed to manage in a constructive way different theories that debate the same theme- the economic crisis?”. As a concequence, the purpose of the essay is to critically analize the keynesism and the mainstream perspectives, currently used to solve the problems generated by the crisis and the economic cycle, as well as to discover both the convergence and the discrepancies between these two main economic doctrines. In the current work, it will be noted that, in order to achieve the above mentioned purpose, we will resume to schematics and abstracting the mechanisms, also to explaining the phenomenons and the informations, as well as to processing and interpreting these informations from a personal perspective, closer to the Austrian School than to the manipulating orthodoxism.Economic cycles, crisis, mainstream, keynesianism
Mainstream and keynesism: - two doctrines, two methods, same ideas -
Taking into consideration that, in order to talk about science we need both different opinions and construtive criticism, the starting point of the issue would be: “How do we succeed to manage in a constructive way different theories that debate the same theme- the economic crisis?”. As a concequence, the purpose of the essay is to critically analize the keynesism and the mainstream perspectives, currently used to solve the problems generated by the crisis and the economic cycle, as well as to discover both the convergence and the discrepancies between these two main economic doctrines. In the current work, it will be noted that, in order to achieve the above mentioned purpose, we will resume to schematics and abstracting the mechanisms, also to explaining the phenomenons and the informations, as well as to processing and interpreting these informations from a personal perspective, closer to the Austrian School than to the manipulating orthodoxism.Economic cycles, crisis, mainstream, keynesianism
Rationality in Economics: from Homo Oeconomicus to „Homo Irationalis”
The aim of the present paper is an attempt to build a scaffolding with the help of which, the concept of “rationality” will be explored from the philosophic and also economic point of view, with the purpose of highlighting that Econometrics and other purely quantitative scientific demonstrations are subject to serious errors. The starting issue is given by the usage of the "rationality" concept in the economic science, the way that it can change the result of the human action and also the risk of treating the rational as being irrational by only taking into account the results of a sole action.rationality; irationality; human action; homo oeconomicus; homo irationalis
eBusiness Master Programs Overview
In the new Information Society of this new millennium the use of Information and Communication Technology (ICT) is essential for the individual’s education and training. A major buzzword nowadays, e-business represents the new trend of the business. In order to become or to remain competitive as a business in the industry or in another field of activity, all the businesses have to become "e". The e-Business Master Program from ASE Bucharest is an interdisciplinary initiative aimed to bring new perspectives to graduated young people and also to other categories of persons interested to discover the challenges of the new net-economy.e-business, individual education
- …
