نتایج جستجو برای: security needs
تعداد نتایج: 415429 فیلتر نتایج به سال:
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...
Welcome to the 3rd Evolving Security and Privacy Requirements Engineering (ESPRE) Workshop in Beijing, China on the 12 of September 2016, co-located with the RE 2016 conference. The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering and security & privacy, and takes ...
The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were examined to determine their influence on the effective management of web banking security risks. Information and communication approaches have not changed the structure of security...
Security of multimedia data is an imperative issue because of fast evolution of digital data exchanges over unsecured network. With the progress in data exchange by the electronic system, we need to secure information. In this paper 128 bit image encryption is used for securing the image. Many security issues are also concern with this exchange and sharing of information. These may be authentic...
Security-enhanced Linux incorporates a strong, flex ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep aration of information based on confidentiality and integrity requirements. This allows threats of tam pering and bypassing of application security mech anisms to be addressed and enables the confine ment of damage that can be caused by malic...
Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default. Hence, any aspect of virtualization needs to undergo constant secu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید