نتایج جستجو برای: security level

تعداد نتایج: 1235388  

Journal: :International Journal of Fuzzy Logic and Intelligent System 2022

2001
Fathi Taibi Mazliza Othman

Bluetooth security has become increasingly important since Bluetooth is going to be used as a standard technology in wireless personal communication. This is especially true for Bluetooth applications that require strong security policies, e.g. mobile commerce applications. In this paper, a Bluetooth service-level security that allows easy implementation of flexible access policies is proposed....

2010
Úlfar Erlingsson Yves Younan Frank Piessens

Computers are often subject to external attacks that aim to control software behavior. Typically, such attacks arrive as data over a regular communication channel and, once resident in program memory, trigger pre-existing, low-level software vulnerabilities. By exploiting such flaws, these low-level attacks can subvert the execution of the software and gain control over its behavior. The combin...

2015
Chen-Yu Lee Krishna M. Kavi

Data breaches are the most serious security breaks among all types of cybersecurity threats. While Cloud hosting services provide assurances against data loss, understanding the security service level agreements (SSLAs) and privacy policies offered by the service providers empowers consumers to assess risks and costs associated with migrating their information technology (IT) operations to the ...

2013
Yongjing A. Li Jiang B. Wu

This paper proposes a data security protection strategy of the SaaS mode ----the SLA based SaaS Security Level. At the same time, it gives concept model and implementation architecture of the security scheme which based on the SaaS Security Level. The SLA based SaaS Security Level takes the requirements of tenants to the data security as a starting point, and it mainly relates to data security ...

2007
M. Smith

Security and data integrity are important aspects in the fields of Grid and cluster computing. However, security usually incurs a certain amount of performance degradation and adds usage complexity to a field of computing where performance is crucial and usage complexity is already high. The growing popularity of Grid computing is leading to vastly different security requirements. While some Gr...

2004
Maximillian Dornseif Felix Gaertner Martin Mink Lexi Pimenidis

There is a general consensus that courses on data security at university degree level should be research-oriented and teach fundamentals of the field, i.e., items of long-term knowledge in contrast to technology-oriented system knowledge. Unfortunately, this consensus often results in courses that are either too theoretical or are outdated with respect to current developments in security techno...

1997
Gerd Wagner

Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level security can be applied to inter-agent communication. This includes the case where an unauthorized agent is misinformed on purpose in order to protect con dential information.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید