Enforce a Global Security Policy for User Access to Clustered Container Systems via User Namespace Sharing

Author(s):  
Ioan-Mihail Stan ◽  
Daniel Rosner ◽  
Stefan-Dan Ciocirlan
Author(s):  
Annika Bergman Rosamond ◽  
Christine Agius

Within the space of roughly two decades, Sweden has changed from a neutral country to one that is currently engaged in a range of activities and practices that are far removed from the definition of neutrality. Its engagement with NATO, contribution of forces to Kosovo, Afghanistan and Libya, and its role as a leading framework nation in the emergent EU Battle Groups suggest at first glance the shifting demands of global security practices. The rationale of the move away from traditional state-centric security, however, obscures a more complex picture. In this chapter, we investigate specific aspects of these changes in relation to Swedish security policy, specifically robust forms of military intervention. We argue that rather than reflecting global security practices, deeper endogenous processes are at work. Significantly, such engagements are part of disembedding norms around neutrality and revising public and elite memory of Sweden as a neutral state. By focusing on identity and memory, we posit that Sweden’s current military engagements are concerned with rewriting identity and with a view to making new memories (or a ‘memory bank’) of wartime experiences. This has played a crucial part in not only justifying and naturalizing specific practices and actions, but also reconstituting identity in the process.


European View ◽  
2010 ◽  
Vol 9 (1) ◽  
pp. 65-69 ◽  
Author(s):  
Gerhard Sabathil

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EU's security. The new institutional framework for the EU's external action will allow it to make further progress in developing a comprehensive security policy, integrating both internal and external dimensions of security and mobilising the policies and instruments required to effectively respond to security threats. New initiatives could pave the way for a more cooperative management of ‘global home affairs’.


1999 ◽  
Vol 12 (2) ◽  
pp. 297-322
Author(s):  
Rex J. Zedalis

A variety of legal problems exist with the UN weapons inspection régime applicable to Iraq. These problems hinder the assurance that Iraq can be disarmed of the ability to produce biological or chemical weapons. Given this fact, the stalemate produced by the mid-December 1998 air strikes against that country might be best resolved by a reconfigured inspection program which aims at addressing Iraqi weapons of mass destruction efforts in the context of global security policy regarding such weaponry, with due account taken of the desires of Iraq's neighbors and the importance of reintegrating that nation into the world community.


Author(s):  
Malina Kaszuba

The transformation of the Russian foreign and security policy based on a more courageous use of military potential is a fact. Over the past several years, Russia has moved from articulating its interests to their enforcement with the use of military force. This article focuses on analyzing this process and identifying its potential consequences for global security. The conclusions drawn by the author, based on the conducted research, allow to state that the armed forces are and will be an important instrument of the Russian foreign and security policy. This does not mean, however, that the Russian Federation will strive for an armed conflict posing a threat to international security.


2021 ◽  
pp. 239965442110038
Author(s):  
Simone Tulumello ◽  
Roberto Falanga

This article takes steps from the birth and consolidation of “homeland” as the central discursive engine of the US national security enterprise; and takes issue with the dominant scholarly interpretation of the geographical and spatial implications of its emergence in terms of the dissolution of space and spatialization in security policy ( Bialasiewicz et al., 2007 : 416). We adopt a multi-scalar approach to exploring security discourse/practice, comparing the performativity of national and global security with the local practice/discourse of public safety—with empirical focus on the case of Memphis (TN). Our main arguments are that the homeland builds on the same performative elements of the emergence and consolidation of a certain conception of “community”, as it has become dominant in public safety policymaking at the local scale; and that the homeland/community performativity is the expression of a never-ending movement of production of multi-scalar geographies of the “good” and “evil”, made of the coexistence of centrifugal (pushing problems away) and centripetal (incorporating any given outside) dimensions.


This research focuses on Secured design architecture of BYOD solution. Bring your Own Device is a project driven in most of the enterprises to provide internet access to employee personal devices and Guest users. It has Resulted in a trend to give Access to Employees Smart phones , tablets and personal to Improve employee productivity and address changing working preferences in todays digital age , The Enterprises are Benefiting by providing lesser Devices to their Employees , this is one of the major reasons for the Enterprise to invest in BYOD Infrastructure. Slowly BYOD becomes a rule rather exception. The BYOD Infrastructure provides their Employees an access to the Internet while being a trusted user accessing the Enterprise infrastructure , which is intended to be Secure . The BYOD Infrastructure also provides Employees to grant Guest User Internet Access to their Visiting Partners as well. Connecting external devices in Corporate network increases the cyber security risk and data leakage incident. Using BYOD services users can do malicious activities, try to gain unauthorized access to internal network which can lead into major security breach. Providing Internet access to the external devices using internal corporate network has resulted in a challenge in addressing significant Security risk , data theft and Shadow IT because of unsecured design architecture that compromise the security policy. Installing malware in BYOD and connecting to Internet network can also lead into serious damage and major security risk. A major concern is also to revoke internet access while employee is no more in the system. Incase if employee left and access does not get revoked on time also can be a risk. Poor BYOD design significantly lead into organization Cyber security risk. The Research Paper has Demonstrated the Use Case for Trusted User access and Untrusted Guest User access and Monitoring of the BYOD-User activity and Audit compliance .In this research paper, a secured Design Architecture, Implementation and analysis is conducted. A practical analysis is conducted regarding the design and a Secure BYOD model is demonstrated. This study also highlights the Secured model of BYOD implementation maintaining organization laid down security policy so that enterprise CEO, CIO, CISO can address concerns for securing the Enterprises BYOD Infrastructure.


Sign in / Sign up

Export Citation Format

Share Document