نتایج جستجو برای: security level
تعداد نتایج: 1235388 فیلتر نتایج به سال:
In late 1992, the Internet Engineering Task Force chartered an Internet Protocol Security Protocol Working Group (IPSEC) to “... develop mechanisms to protect client protocols of IP” [10]. The objective was to provide “... authentication, integrity, access control, and confidentiality” at the network layer. In the ~18 months since then, several schemes have been proposed to address this objecti...
An important objective for low-level software security research is to develop techniques that make it harder to launch attacks that exploit implementation details of the system under attack. Baltopoulos and Gordon have summarized this as the principle of source-based reasoning for security: security properties of a software system should follow from review of the source code and its source-leve...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout on disk, minimal changes to existing NADs, and only small changes to the standard protocol for accessing remote block-based devices. Thus, existing NAD file systems and storage-management software could incorporate our ...
This paper considers the relationship between economic factors and national security. While considering a broad number of issue areas, the principal theme of the course is the way in which economic factors (as immigration) fundamentally influence the national security of the region, and the way in which those factors shape and constrain the strategies chosen to pursue that security. South-South...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید