ad hoc security
Recently Published Documents


TOTAL DOCUMENTS

9
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

2018 ◽  
Vol 49 (6) ◽  
pp. 438-456 ◽  
Author(s):  
Lior Volinz

Security responses increasingly involve the delegation of security roles from state actors, such as the police and the military, to a plurality of public and private institutions. This article focuses on the emergence of a modular governance logic in security provision, in which urban security is diffused into differing modules – security actors, performances, technologies and practices – which can be enlisted, deployed, instructed, entwined, detached and withdrawn at will. This article identifies three features of urban modular security provision: the heterogeneity of its public and private components, the development of reserved capacities, and the differential multifacetedness of its performances and practices. These are explored through the case study of East Jerusalem, in which a modular security provision emerged where previously undefined and ad-hoc security arrangements became cohesive, normalized and codified through practice and law. In tracing the flows of security authorities, personnel and knowledge produced within a modular security assemblage, this article proposes that the modular assembly of security actors complements policing institutions by providing other informal disciplinary, punitive and statecrafting powers, in a manner which obfuscates controversial state policies and unequally distributes rights and resources.


Author(s):  
Shadi Aljawarneh

Information security is a key challenge in the Cloud because the data will be virtualized across different host machines, hosted on the Web. Cloud provides a channel to the service or platform in which it operates. However, the owners of data will be worried because their data and software are not under their control. In addition, the data owner may not recognize where data is geographically located at any particular time. So there is still a question mark over how data will be more secure if the owner does not control its data and software. Indeed, due to shortage of control over the Cloud infrastructure, use of ad-hoc security tools is not sufficient to protect the data in the Cloud; this paper discusses this security. Furthermore, a vision and strategy is proposed to mitigate or avoid the security threats in the Cloud. This broad vision is based on software engineering principles to secure the Cloud applications and services. In this vision, security is built into all phases of Service Development Life Cycle (SDLC), Platform Development Life Cycle (PDLC) or Infrastructure Development Life Cycle (IDLC).


2011 ◽  
Vol 22 (7) ◽  
pp. 1641-1651
Author(s):  
Xue-Wen DONG ◽  
Jian-Feng MA ◽  
Wen-Sheng NIU ◽  
Li-Qiang MAO ◽  
Hui XIE

2011 ◽  
Vol 1 (2) ◽  
pp. 64-70 ◽  
Author(s):  
Shadi Aljawarneh

Information security is a key challenge in the Cloud because the data will be virtualized across different host machines, hosted on the Web. Cloud provides a channel to the service or platform in which it operates. However, the owners of data will be worried because their data and software are not under their control. In addition, the data owner may not recognize where data is geographically located at any particular time. So there is still a question mark over how data will be more secure if the owner does not control its data and software. Indeed, due to shortage of control over the Cloud infrastructure, use of ad-hoc security tools is not sufficient to protect the data in the Cloud; this paper discusses this security. Furthermore, a vision and strategy is proposed to mitigate or avoid the security threats in the Cloud. This broad vision is based on software engineering principles to secure the Cloud applications and services. In this vision, security is built into all phases of Service Development Life Cycle (SDLC), Platform Development Life Cycle (PDLC) or Infrastructure Development Life Cycle (IDLC).


Author(s):  
Sadie Creese ◽  
Michael Goldsmith ◽  
Bill Roscoe ◽  
Ming Xiao
Keyword(s):  
Ad Hoc ◽  

Sign in / Sign up

Export Citation Format

Share Document