Rule-Based policies for secured defense meetings

Shetty, Pravin and Loke, Seng 2007, Rule-Based policies for secured defense meetingsEncyclopedia of Information Ethics and Security, IGI Global,, pp.563-570, doi: 10.4018/978-1-59140-987-8.ch083.

Attached Files
Name Description MIMEType Size Downloads

Title Rule-Based policies for secured defense meetings
Author(s) Shetty, Pravin
Loke, SengORCID iD for Loke, Seng
Title of book Encyclopedia of Information Ethics and Security
Publication date 2007
Start page 563
End page 570
Total pages 8
Publisher IGI Global
Summary Security of the information in a defense department of any country is of utmost importance. And today, in this nuclear world, security and privacy of the various defense plans and other valuable strategies of a country’s defense force is in focus. This security is of prime importance during war periods. The defense strategies are normally discussed in the meetings held at the various headquarters of the defense department. In today’s computing world these meetings are conducted with the various concerned persons connected via a secured network in a room. If a person is unable to attend a meeting due to some important work, then he or she takes part in the discussion through his or her laptop. Such meetings involving technology have also become a part of research centers where innovation of new technologies is being carried out.
ISBN 9781591409878
Language eng
DOI 10.4018/978-1-59140-987-8.ch083
Indigenous content off
HERDC Research category D2.1 Reference work
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 35 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 15 Jul 2019, 14:29:00 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact