Securing ‘from within’

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Web-accessible Information Systems within Higher Education Institutions

Within Higher Education, concerns are growing with regard the gap between what university central services traditionally provide and what the academic departments within the institution need. The Institutionally Secure Integrated Data Environment (INSIDE) project is a JCIEL funded collaborative project between the Universities of St Andrew and Durham that proposes to address the above concerns ...

متن کامل

On Securing Communication from Profilers

A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for ...

متن کامل

Securing Cloud from Cloud Drain

Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1...

متن کامل

Securing Manet from Blackhole and Wormhole Attacks

Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol). Blackhole and Wormhole nodes are malicious nodes which degr...

متن کامل

Securing ARP From the Bottom Up

The basis for all network communication is the Address Resolution Protocol, which maps IP addresses to a device’s MAC identifier. ARP resolution has long been vulnerable to spoofing and other attacks, and past proposals to secure the protocol have focused on key ownership rather than the identity of the machine itself. This paper introduces arpsec, a secure ARP protocol that is based on host at...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Politikon: The IAPSS Journal of Political Science

سال: 2008

ISSN: 2414-6633

DOI: 10.22151/politikon.14.2.4