Topic
Guard (information security)
About: Guard (information security) is a research topic. Over the lifetime, 12145 publications have been published within this topic receiving 69213 citations. The topic is also known as: cross domain solution & cross-domain solution.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The degree and basis of social power of uniformed figures was investigated in two field experiments as mentioned in this paper, where subjects were asked to pick up a paper bag or to give a dime to a stranger, or to move away from a bus stop.
Abstract: The degree and basis of social power of uniformed figures was investigated in two field experiments. In the first experiment, subjects were stopped in the street by an experimenter dressed in one of three ways: a civilian, a milkman, or a guard. They were asked to pick up a paper bag, or to give a dime to a stranger, or to move away from a bus stop. The results indicated that the subjects complied more with the guard than with the civilian or milkman. In the second field experiment, designed to examine the basis of the guard's power, subjects were asked to give a dime to a stranger under conditions of either surveillance or nonsurveillance. The guard's power was not affected by the surveillance manipulation. A logical analysis of social power indicated that the guard's power was most likely based on legitimacy. Two questionnaire studies indicated, however, that college students did not perceive the guard as having either more. power or more legitimacy than the milkman or civilian. The nature and importance of understanding legitimacy was discussed.
171 citations
•
24 Nov 2005
TL;DR: In this article, the authors present a set of recommendations for organizing for success in the U.S. Problem and Opportunity 2. Democracy and Police Reform 3. Programs and Policy 4. Strategies of Reform 5. Security and Reform 6. Managing Assistance 7. Evaluating Impact 8. Organizing for Success
Abstract: Preface 1. Problem and Opportunity 2. Democracy and Police Reform 3. U.S. Programs and Policy 4. Strategies of Reform 5. Security and Reform 6. Managing Assistance 7. Evaluating Impact 8. Organizing for Success Appendix: Executive summary of recommendations Index
171 citations
•
17 Aug 1995
TL;DR: In this paper, a universal mount for a single-barreled, single-shot, semi-circular, fixed-length, fully automatic rifle is presented, which achieves and maintains continuous alignment between the sight line of any optical attachments and the direction of a barrel that has become deformed due to thermal stress.
Abstract: A universal mount for a rifle comprises an upper rail having a plurality of traverse ribs running from the back of the upper receiver to the gas block, and a hand guard surrounding the barrel. The hand guard has side mounts allowing the addition of accessory devices such as flashlights and laser sights. A lower rail, designed to accept a grenade launcher and a bayonet, resides between the barrel and the hand guard. A heat shield is attached to the hand guard to protect the marksman from injury. A semi-circular retaining ring locks the hand guard to the gas block by means of a throughhole which matingly engages a pin located in the muzzle end of the hand guard. When in place, the present invention provides a weapons' platform which achieves and maintains continuous alignment between the sight line of any optical attachments and the direction of a barrel that has become deformed due to thermal stress. The present invention can be used alone or in conjunction with a ballistic optimization system and can be backfitted onto an existing rifle without altering its basic components.
163 citations
•
13 Sep 2002
TL;DR: In this paper, a system and method for generating an updated version of or reconstructing a previously enforced version of, a local client security policy stored in an application guard is presented. But the application guard uses the distributed change to update the currently enforced version, while the policy manager generates a reversing delta equal to the reverse of the change (or accumulation of changes).
Abstract: A system and method for generating an updated version of, or reconstructing a previously enforced version of, a local client security policy stored in an application guard. To update a local security policy, a policy manager distributes a change (or an accumulation of changes) to the currently enforced version of the security policy through a network to the application guard. The application guard uses the distributed change to update the currently enforced version of the local client security policy. To reconstruct a previously enforced version of a local security policy, the policy manager generates a reversing delta equal to the reverse of the change (or accumulation of changes) from the previously enforced version to the currently enforced version of the security policy, and distributes the reversing delta through the network to the application guard. The application guard applies the distributed reversing delta to the currently enforced version of the local client security policy to reconstruct the previously enforced version of the security policy.
159 citations