منابع مشابه
Securing Web-accessible Information Systems within Higher Education Institutions
Within Higher Education, concerns are growing with regard the gap between what university central services traditionally provide and what the academic departments within the institution need. The Institutionally Secure Integrated Data Environment (INSIDE) project is a JCIEL funded collaborative project between the Universities of St Andrew and Durham that proposes to address the above concerns ...
متن کاملOn Securing Communication from Profilers
A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for ...
متن کاملSecuring Cloud from Cloud Drain
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1...
متن کاملSecuring Manet from Blackhole and Wormhole Attacks
Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol). Blackhole and Wormhole nodes are malicious nodes which degr...
متن کاملSecuring ARP From the Bottom Up
The basis for all network communication is the Address Resolution Protocol, which maps IP addresses to a device’s MAC identifier. ARP resolution has long been vulnerable to spoofing and other attacks, and past proposals to secure the protocol have focused on key ownership rather than the identity of the machine itself. This paper introduces arpsec, a secure ARP protocol that is based on host at...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Politikon: The IAPSS Journal of Political Science
سال: 2008
ISSN: 2414-6633
DOI: 10.22151/politikon.14.2.4