نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2014
Hemangini J. Patel Riddhi Patel

in today’s IT world cloud computing is ubiquitous. For that security concern is also an important aspect of it. In this paper we take a review of the different Intrusion Detection System used for cloud computing. We mention IDS positioning in cloud location to get better security over most desired threats attacks and issues.

2016
François-Xavier Standaert

Extended abstract. Side-channel analysis is an important concern for the security of cryptographic implementations, and may lead to powerful key recovery attacks if no countermeasures are deployed. Therefore, various types of protection mechanisms have been proposed over the last 20 years. In view of the cost and performance overheads caused by these protections, their fair evaluation is a prim...

2016
Benjamin Dauphin

Security is a growing concern for embedded system designers. Therefore a wide range of protection mechanisms have been developed in the recent years to counter malicious attacks. This work gives an overview and compares existing solutions concerning the protection of the test access port. Potential improvements are then proposed over some of the previous works. Keywords—security, JTAG, IEEE 168...

2009
Trajce Dimkov Wolter Pieters Pieter Hartel

The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and...

2014
Rajesh Kumar Bunkar

Security is the major obstacles of the long dreamed vision of cloud computing. The sensitive application data are moved into the cloud data centres and run on virtual computing resources in the form of virtual device. The user concerns about cloud computing is its security. Enterprise data centres, Internet Data Centres (IDC) and service provider’s offer racks and networks, and the remaining de...

2010
Trajce Dimkov Wolter Pieters Pieter H. Hartel

The security goals of an organization are realized through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals by combining physical, digital and social means. A systematic analysis of such attacks requires the whole environment where the insider operates to be...

2005
Jaime A. Pavlich-Mariscal Steven A. Demurjian Laurent D. Michel

The objective of this research is to develop techniques that integrate alternative security concerns (e.g., mandatory access control, delegation, authentication, etc.) into the software process. The resulting model-driven framework preserves separation of security concerns from modeling through implementation, and allows security personnel to pick and choose security concerns to concerns promot...

2013
Lars Braubach Kai Jander Alexander Pokahr

Security is a vital feature for most real-world distributed applications. For applications using an agent-based middleware, comprehensive support for many security-related aspects can and should already be provided by the platform in a holistic manner. Moreover, security in practice does not only concern the enforcement of well-known security objectives like authenticity and con dentiality but ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید