نتایج جستجو برای: security environment

تعداد نتایج: 678646  

2007
Brett Wilson Calvin Ko Alefiya Hussain

Configuring a security experiment can be tedious, involving many low level and repetitive configuration tasks. In order to make DETER’s capabilites accessible to users at all skill levels, we have designed and implemented a Security Experimentation EnviRonment (SEER) that provides security researchers the ability to create, plan, and iterate through a large range of experimental scenarios with ...

2000
Margus Freudenthal Sven Heiberg Jan Willemson

Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all current digital signature applications. This paper describes the solution developed and prototyped by the authors – using a mobile computing device with a smart card reader for creating digital signatures. We give an overvi...

Journal: :CoRR 2015
Akashdeep Bhardwaj GVB Subrahmanyam Vinay Avasthi Hanumat Sastry

With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based applications and services that require data and link enc...

2013
Mohan Reddy

The growth in field of cloud computing increases threat security aspects. Security has remained a constant issue for Internet and networking, when we are talking about security cloud really effects. Lack of security is the only a problem or difficulty that must be overcome in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examinin...

2001
Rattapoom Tuchinda

The Problem: The idea of ubiquitous a computing environment where sensors and devices exist everywhere around us has opened up interesting security and privacy issues. Imagine a scenario in which Ben is working in an intelligent room. He does not want to be disturbed by anyone, so he tells the intelligent room that he does not want to be reached by anyone in the next two hours unless it is an e...

Journal: :CoRR 2013
Rohit Bhadauria Rajdeep Borgohain Abirlal Biswas Sugata Sanyal

Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure pr...

2015
S. Geetha Prasanna Venkatesan

The vision of Pervasive Computing is that every device we communicate today has become a part of everyday objects, augmented with information services. Though there are a number of frameworks is been developed for security of smart systems, there is still space for research in the field of security of these systems. User privacy and Trust needs more concentration in a pervasive environment. Con...

2014
Michael F. Thompson Cynthia E. Irvine

In 2005, the initial version of CyberCIEGE, a network security simulation packaged as a video game, was released. Since then, we have developed a suite of game scenarios and have enhanced and extended the underlying game engine to cover a broad set of cybersecurity concepts. CyberCIEGE includes a Scenario Development Kit to customize existing game scenarios and create new ones. A Scenario Devel...

2013
Gary Nilson Kent Wills Jeff Stuckman James Purtilo

Web applications are a rich source of vulnerabilities due to their high exposure, diversity, and popularity. Accordingly, web application vulnerabilities are useful subjects for empirical security research. Although some information on vulnerabilities is publicly available, there are no publicly available datasets that couple vulnerabilities with their source code, metadata, and exploits throug...

2015
Rohit BHADAURIA Rajdeep BORGOHAIN Sugata SANYAL

Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. Thishas made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure pri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید