Walls of security and policy enforcement in Belfast

被引:0
|
作者
Ballif, Florine [1 ]
机构
[1] Inst Urbanisme Paris, Paris, France
关键词
D O I
10.4000/mimmoc.422
中图分类号
K [历史、地理];
学科分类号
06 ;
摘要
This article deals with the evolution of the building of security walls (peacelines) in Belfast. It aims at understanding this evolution in parallel to the transformation in law and order policies and the security situation. After the military and policing approach of the beginning follows the politicisation of the question and a growing involvement of the civil society in the 1990s.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Policy specification and enforcement for detection of security violations in a mail service
    Murali, A.
    Rao, M.
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 172 - +
  • [42] Sapper: A Language for Hardware-Level Security Policy Enforcement
    Li, Xun
    Kashyap, Vineeth
    Oberg, Jason K.
    Tiwari, Mohit
    Rajarathinam, Vasanth Ram
    Kastner, Ryan
    Sherwood, Timothy
    Hardekopf, Ben
    Chong, Frederic T.
    [J]. ACM SIGPLAN NOTICES, 2014, 49 (04) : 97 - 111
  • [43] Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting
    Ziadia, Marwa
    Mejri, Mohamed
    Fattahi, Jaouhar
    [J]. NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2021, 337 : 85 - 98
  • [44] Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework
    Shao, Yuru
    Ott, Jason
    Chen, Qi Alfred
    Qian, Zhiyun
    Mao, Z. Morley
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [45] A Declarative Approach for Easy Specification and Automated Enforcement of Security Policy
    Hamdi, Hedi
    Bouhoula, Adel
    Mosbah, Mohamed
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 60 - 71
  • [46] Efficient security policy enforcement in a location based service environment
    Atluri, Vijayalakshmi
    Shin, Heechang
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 61 - +
  • [47] A METHOD FOR SOFTWARE IMPLEMENTATION OF COMPUTER SECURITY POLICY ENFORCEMENT MECHANISMS
    WISSEMAN, WS
    GOBUTY, DE
    [J]. AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, : 1063 - 1069
  • [48] THE ENFORCEMENT OF SECURITY
    Kirk, Grayson
    [J]. YALE LAW JOURNAL, 1946, 55 (05): : 1081 - 1096
  • [49] A Simple Security Policy Enforcement System for an Institution Using SDN Controller
    Hadi, Fazal
    Imran, Muhammad
    Durad, Muhammad Hanif
    Waris, Muhammad
    [J]. PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 489 - 494
  • [50] Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
    Li, Yanhuang
    Cuppens-Boulahia, Nora
    Crom, Jean-Michel
    Cuppens, Frederic
    Frey, Vincent
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 105 - 118