Rule-Based Policies for Secured Defense Meetings

Rule-Based Policies for Secured Defense Meetings

Pravin Shetty (Monash University, Australia) and Seng Loke (La Trobe University, Australia)
Copyright: © 2007 |Pages: 8
DOI: 10.4018/978-1-59140-987-8.ch083
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Security of the information in a defense department of any country is of utmost importance. And today, in this nuclear world, security and privacy of the various defense plans and other valuable strategies of a country’s defense force is in focus. This security is of prime importance during war periods. The defense strategies are normally discussed in the meetings held at the various headquarters of the defense department. In today’s computing world these meetings are conducted with the various concerned persons connected via a secured network in a room. If a person is unable to attend a meeting due to some important work, then he or she takes part in the discussion through his or her laptop. Such meetings involving technology have also become a part of research centers where innovation of new technologies is being carried out.

Complete Chapter List

Search this Book:
Reset