نتایج جستجو برای: security level
تعداد نتایج: 1235388 فیلتر نتایج به سال:
Bluetooth security has become increasingly important since Bluetooth is going to be used as a standard technology in wireless personal communication. This is especially true for Bluetooth applications that require strong security policies, e.g. mobile commerce applications. In this paper, a Bluetooth service-level security that allows easy implementation of flexible access policies is proposed....
Computers are often subject to external attacks that aim to control software behavior. Typically, such attacks arrive as data over a regular communication channel and, once resident in program memory, trigger pre-existing, low-level software vulnerabilities. By exploiting such flaws, these low-level attacks can subvert the execution of the software and gain control over its behavior. The combin...
Data breaches are the most serious security breaks among all types of cybersecurity threats. While Cloud hosting services provide assurances against data loss, understanding the security service level agreements (SSLAs) and privacy policies offered by the service providers empowers consumers to assess risks and costs associated with migrating their information technology (IT) operations to the ...
This paper proposes a data security protection strategy of the SaaS mode ----the SLA based SaaS Security Level. At the same time, it gives concept model and implementation architecture of the security scheme which based on the SaaS Security Level. The SLA based SaaS Security Level takes the requirements of tenants to the data security as a starting point, and it mainly relates to data security ...
Security and data integrity are important aspects in the fields of Grid and cluster computing. However, security usually incurs a certain amount of performance degradation and adds usage complexity to a field of computing where performance is crucial and usage complexity is already high. The growing popularity of Grid computing is leading to vastly different security requirements. While some Gr...
There is a general consensus that courses on data security at university degree level should be research-oriented and teach fundamentals of the field, i.e., items of long-term knowledge in contrast to technology-oriented system knowledge. Unfortunately, this consensus often results in courses that are either too theoretical or are outdated with respect to current developments in security techno...
Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level security can be applied to inter-agent communication. This includes the case where an unauthorized agent is misinformed on purpose in order to protect con dential information.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید