نتایج جستجو برای: security needs

تعداد نتایج: 415429  

Journal: :Research Journal of Applied Sciences, Engineering and Technology 2014

1999
Cynthia Irvine Timothy Levin Robert C. Chaplin R Elster Neil Rowe

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...

2016
Kristian Beckers Shamal Faily Seok-Won Lee Nancy R. Mead

Welcome to the 3rd Evolving Security and Privacy Requirements Engineering (ESPRE) Workshop in Beijing, China on the 12 of September 2016, co-located with the RE 2016 conference. The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering and security & privacy, and takes ...

2012
Ioannis Koskosas

The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were examined to determine their influence on the effective management of web banking security risks. Information and communication approaches have not changed the structure of security...

2014
Shaily Garg Vijay Maheshwari

Security of multimedia data is an imperative issue because of fast evolution of digital data exchanges over unsecured network. With the progress in data exchange by the electronic system, we need to secure information. In this paper 128 bit image encryption is used for securing the image. Many security issues are also concern with this exchange and sharing of information. These may be authentic...

2004
Peter A. Loscocco Stephen D. Smalley

Security-enhanced Linux incorporates a strong, flex­ ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep­ aration of information based on confidentiality and integrity requirements. This allows threats of tam­ pering and bypassing of application security mech­ anisms to be addressed and enables the confine­ ment of damage that can be caused by malic...

2008
Carl Gebhardt Allan Tomlinson

Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default. Hence, any aspect of virtualization needs to undergo constant secu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید