• No results found

Security architecture

African Peace And Security Architecture (APSA)

African Peace And Security Architecture (APSA)

... 183. As is the case in most international organization, monitoring of decisions reached by member states and (other) regional organization remains a key challenge for integration including strengthening of APSA. Such ...

101

Android Security and Its Rooting—A Possible Improvement of Its Security Architecture

Android Security and Its Rooting—A Possible Improvement of Its Security Architecture

... the security architecture of the systems is dependent on a Linux Based Kernels which ensures for the isola- tion of applications from each other in order to ensure for cohesion ...the security model ...

12

Fujitsu Enterprise Security Architecture

Fujitsu Enterprise Security Architecture

... Recently, there has been a growing need for enterprises to respond to compliance requirements and an open framework in order to better serve society. To address this need, information security plays a vital role. ...

6

Security architecture for law enforcement agencies

Security architecture for law enforcement agencies

... stringent security requirements that may delay the deployment of these new applications, since necessary security measures must be implemented ...integrated security architecture for LEAs that ...

24

SHAD: A Human-Centered Security Architecture

SHAD: A Human-Centered Security Architecture

... manage security in a permissive ubiquitous environment. Other security ar- chitectures for ubiquitous computing are highly centralized and depend on middleware or frameworks [1, 3, 4, ...complete ...

11

Toward Establishing a Catalog of Security Architecture Weaknesses

Toward Establishing a Catalog of Security Architecture Weaknesses

... of security patterns, or degradation of security architecture over time [29, ...the security architecture that can be successfully exploited by an intruder with reverse-engineering ...

46

A Security Architecture for WiMAX Networks

A Security Architecture for WiMAX Networks

... in security architecture ...layer architecture and security architecture for Wimax, The protocol layer architecture is made up of two main layers the physical layer and Medium ...

5

The Saga Security System: A Security Architecture for Open Distributed Systems

The Saga Security System: A Security Architecture for Open Distributed Systems

... Saga Security System, a security architecture in such en- vironments, highlighting Saga authorization model and its security ...Saga Security System, which provides protection of a Saga ...

6

Africa s Evolving Security Architecture

Africa s Evolving Security Architecture

... Less than three years after the inauguration of the African Union in Durban, South Africa, an African security architecture is taking shape at a remarkable pace. Although the provisions in the various Acts, ...

8

New Cloud Security Architecture System

New Cloud Security Architecture System

... functional architecture is ...basic security architecture to security product provides whole security solution for cloud computing providers and reliable security product for ...

8

HYBRID SECURITY ARCHITECTURE FOR DATA COMMUNICATIONS (SADC)

HYBRID SECURITY ARCHITECTURE FOR DATA COMMUNICATIONS (SADC)

... Layer security is a growing area of concern for developers, designers, quality assurance specialist and ...Application security is the prevention of flaws and vulnerability that occur in the design, ...

5

Research in Security Architecture for Internet of Ships

Research in Security Architecture for Internet of Ships

... information security challenges. In this paper, by security analyzing of data transmission mode and comparing of existing security mechanisms for wireless network, security architecture ...

5

The EU and the African Peace and Security Architecture

The EU and the African Peace and Security Architecture

... The new African Peace and Security Architecture has grown out of previous attempts to create a stable and peaceful continent. A major influence on its development has been the principle of African solutions ...

13

SECURITY ARCHITECTURE

SECURITY ARCHITECTURE

... scalable. Security models can be applied to any network or system ...The security architecture of a network is partly based on the security of each system attached to ...it. Security ...

20

Reconfigurable Security Architecture for Embedded Systems

Reconfigurable Security Architecture for Embedded Systems

... promote security within embedded sys- tems are mainly dealing with processor-based approaches ...of security using such solutions are very ...on architecture support for energy-efficient ...with ...

8

A Security Architecture for Mobility-Related Services

A Security Architecture for Mobility-Related Services

... So, how can we reduce the time required to establish a security as- sociation for new services? In iARSec, we take two complementary approaches to this problem: caching associations, and mapping ad- dresses. Once ...

18

Visualising the Structure of an IC card Security Architecture

Visualising the Structure of an IC card Security Architecture

... protocol security analysis tool [10]; the language Argos [8] supports automatic protocol validation using a mix of depth-first and breadth-first search for particular scenarios; the Protean tool [3] is designed to ...

24

Virtual Machine Introspection: Security Architecture Overview

Virtual Machine Introspection: Security Architecture Overview

... new architecture that provides good visibility of the monitored host, while still providing strong isolation for the IDS, hence providing significant resistance to both evasion and ...

7

A Correctness Proof of a Mesh Security Architecture

A Correctness Proof of a Mesh Security Architecture

... Real protocol implementations such as MSA require more than simple key agreement. Additional information must be exchanged and agreed on before secure communi- cation can happen. Examples of information of this type are ...

16

System Aware Cyber Security Architecture

System Aware Cyber Security Architecture

... Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (1) Architectural Deterrence Claim Assigned suitable scores for deterrence Service SelecDon [r] ...

34

Show all 10000 documents...

Related subjects