نتایج جستجو برای: security system

تعداد نتایج: 2351256  

1998
Michael Hicks

Active Networks o er the ability to program the network on a per-router, per-user, or even per-packet basis. Unfortunately, this added programmability compromises the security of the system by allowing a wider range of potential attacks. Any feasible Active Network architecture therefore requires strong security guarantees. Of course, we would like these guarantees to come at the lowest possibl...

2010
PETER G. NEUMANN

This paper considers the problem of attaining computer systems and applications programs that are both highly secure and highly reliable. It contrasts two current alternative approaches, one remedial, the other preventive. A remedial approach is outlined based on a classification of software security violations suggested by Bisbey, Carlstedt, and Hollingworth at lSI. This remedial analysis is t...

2013
Genesis Ajah

Security systems play an important role in the protection of lives and investment. The aim of this project is to design an efficient and cheap security system, which is accessible from any part of the world through the internet, and can be employed in every facet of the economy. This is achieved by incorporating various subsystems (such as surveillance, intruder control, access control, fire de...

2003
Dazhi Wang Bharat B. Madan Kishor S. Trivedi

Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several res...

2008
Trent Jaeger

Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build “secure” operating systems — operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we...

2011
Ioannis V. Koskosas Nikolaos Asimopoulos

A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation meth...

Journal: :Japanese Journal of Radiological Technology 1998

Journal: :Journal of Physics: Conference Series 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید