نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
The traditional electrical power grid is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid with information and communication technologies (ICT). Such integration empowers the electrical utilities providers and consumers, improves the efficiency and the availability of the power system while constantly monitoring, controlling and managing the de...
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach, whereby knowledge about the eff...
—In recent years, there have been major developments in, and deployment of, diverse mobile technology. Security issues in mobile computing are now presenting significant challenges. The ability to move from one network to another, and from one provider to another creating thus vertical and horizontal handoffs, has increased the complexity of mobile security. There are many research groups, such...
In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interoperation between applications specifying di erent, possibly inconsistent security polici...
In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interop-eration between applications specifying diierent, possibly inconsistent security polic...
The most commercially available database provides security facility for a single table. However the situation has been changed, as enterprises move from local database to information backbone composed of cooperating heterogeneous database and then direct sharing of information between enterprise on the Internet. A strict security measure at database level is essential for a secure database desi...
As result of combining heterogeneous network technologies, network architectures become increasingly complex. Administrative domains, representing functional or nonfunctional responsibilities and obligations, and their relationships in terms of reference points are used to find appropriate abstractions and thus managing the complexity. In this paper domain models, as organization of environment...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید