Keystone Business Models for Network Security Processors
نویسندگان
چکیده
منابع مشابه
Adding Security to Network Via Network Processors
With the increasing need of security, cryptographic processing becomes a crucial issue for network devices. Traditionally security functions are implemented with Application Specific Integrated Circuit (ASIC) or GeneralPurposed Processors (GPPs). Network processors (NPs) are emerging as a programmable alternative to the conventional solutions to deliver high performance and flexibility at moder...
متن کاملPower-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS), power gating (PG), and multipledomain partitioning are regarded as effective schemes to reduce dynamic and static power. In this paper, we investigate the problem of power-aware scheduling tasks running on a scalabl...
متن کاملSecurity Models for Trusting Network Appliances
A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Se...
متن کاملEnhanced Security Models for Network Protocols
Modeling security for protocols running in the complex network environment of the Internet can be a daunting task. Ideally, a security model for the Internet should provide the following guarantee: a protocol that “securely” implements a particular task specification will retain all the same security properties as the specification itself, even when an arbitrary set of protocols runs concurrent...
متن کاملSemantic Support for Security-Annotated Business Process Models
Service-Oriented Architectures (SOA) benefit from business processes (BP), which orchestrate web services (WS) and human actors in cross organizational environments. In this setting, handling the security and privacy issues while exchanging and processing personal data is essential. This lacks for secure business processes management. To achieve this, we represent security constraints descripti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technology Innovation Management Review
سال: 2013
ISSN: 1927-0321
DOI: 10.22215/timreview703