A Philosophy of Security Architecture Design

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Design of a Cryptographic Security Architecture

Traditional security toolkits have concentrated mostly on defining a programming interface (API) and left the internals up to individual implementors. This paper presents a design for a portable, flexible security architecture based on traditional computer security models involving a security kernel which controls access to security-relevant objects and attributes based on a configurable securi...

متن کامل

What is the philosophy of Islamic architecture (analysis of discipline's philosophy in architecture based on observation theory)

Lack of attention to the philosophy of architecture as an intermediate science between general philosophy and architecture science has caused many researchers to link their research to philosophy without methodology. They introduce their research as the philosophy of Islamic architecture; While the philosophy of Islamic architecture is a kind of philosophy. The general philosophy merely provide...

متن کامل

A Layered Security Architecture: Design Issues

System security is a key technology to the development and deployment of IT applications and services in a growing global network. Security is critical at various levels of the system. However, security solutions typically address a very specific vulnerability with little relation to the larger picture of secure information systems. Organisations have successfully implemented these solutions wi...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

Optimal Design of Information Technology Security Architecture

Information technology (IT) security has emerged as an important issue in e-commerce. Firms typically employ multiple security technologies such as firewalls and intrusion detection systems (IDS) to secure their IT systems. An assessment of the value of these technologies is crucial for firms to design the optimal architecture. Such assessments are also useful to security technology developers ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2020

ISSN: 0929-6212,1572-834X

DOI: 10.1007/s11277-020-07310-5