Building an Overseas Infrastructure Offices of the Information Security Industry

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing the Risk of an Information Infrastructure Through Security Dependencies

We outline a framework for the risk assessment of information infrastructures that generalizes the notion of dependency with respect to attributes such as confidentiality, integrity or availability. Dependencies are used to model an infrastructure at distinct abstraction levels and to discover attack strategies as well as risk mitigation plans. A plan is formulated in terms of set of countermea...

متن کامل

Building the next Generation Biological Information Infrastructure

The grand challenge for the 21st century is to harness the accumulating knowledge of Earth’s biodiversity and the ecosystems that support it. To accomplish this, we must mobilize biological information  assemble it, organize it, and deliver it with dramatically increased capacity. We must elevate the global biological information infrastructure to a new level of capability  a “next generation...

متن کامل

Building Security-Aware Applications on Celestial Network Security Management Infrastructure

Heterogeneous and distributed nature of the Internet makes it very diicult to customize security protocols and policies in order to satisfy the security needs of applications. Celestial network security management project addresses this issue through building an infrastructure that can dynamically set up inter-domain secure communication channels upon the requests of applications. Celestial Sys...

متن کامل

TCO-aware provisioning of information security infrastructure

© TCO-aware provisioning of information security infrastructure Philip Robinson, Bryan Stephenson HP Laboratories HPL-2008-195 TCO automated security infrastructure provisioning As IT infrastructure proliferates, higher-level security controls must become interpretable and enforceable by machines, largely without human intervention. We establish a single provisioning model and process for addre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information and Communication Engineering

سال: 2016

ISSN: 2234-4772

DOI: 10.6109/jkiice.2016.20.1.103