Results 1 - 10
of
6,932
Enterprise Security Aspects
- In AOSD Tech. for Application-Level Security (AOSDSEC'04
, 2004
"... This report surveys common security requirements for enterprise applications and analyzes how aspects can meet these. It analyzes how largescale applications of aspects to security can work. It is intended to stimulate discussion by complementing research that looks at small-scale security aspect ..."
Abstract
- Add to MetaCart
This report surveys common security requirements for enterprise applications and analyzes how aspects can meet these. It analyzes how largescale applications of aspects to security can work. It is intended to stimulate discussion by complementing research that looks at small-scale security
Security Aspects of FPGAs in . . .
- CHAPTER IN "NEW ALGORITHMS, ARCHITECTURES, AND APPLICATIONS FOR RECONFIGURABLE COMPUTING, WOLFGANG ROSENSTIEL , PATRICK LYSAGHT (EDS.)
"... This contribution provides a state-of-the-art description of security issues on FPGAs from a system perspectives. We consider the potential security problems of FPGAs and propose some countermeasure for the existing drawbacks of FPGAs. Even though there have been many contributions dealing with the ..."
Abstract
- Add to MetaCart
with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution is one of the few investigations of system and security aspects.
Security Aspects in Cloud Computing
"... Abstract: The purpose of this paper is to study various security aspects in Cloud Computing. It is a service delivery system which provides computing services including storage of data to users in all sectors through internet or private networks. In this paper, we explore security threats associated ..."
Abstract
- Add to MetaCart
Abstract: The purpose of this paper is to study various security aspects in Cloud Computing. It is a service delivery system which provides computing services including storage of data to users in all sectors through internet or private networks. In this paper, we explore security threats
The Security Aspects of Mobile IP
"... Mobile Computing is a Human-Computer Interaction (HCI) by which a computer is expected to be transported during normal usage. Mobile Computing involves mobile communication, mobile hardware and mobile software. Commnication issues comprise ad-hoc and infrastructure networks/frameworks as well commun ..."
Abstract
- Add to MetaCart
communication properties, protocols, data formats, concrete technologies and security aspects. The main objective of this study is to give an overview to Mobile IP in the light of its Introduction, security, header, security tunneling, In-campus network security models, and different sort of assaults and course
Security Aspects Of DRM Systems
- 25TH SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 25TH SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX
, 2004
"... ..."
Security Aspect of Cloud Computing
"... Abstract- Cloud computing is the use of computing resources that are delivered as a service over a network. Today, cloud computing generates a lot of excitement. It is both promising and daunting. Businesses world see its potential but also have many issues for discussion. Cloud computing offers att ..."
Abstract
- Add to MetaCart
attractive financial and technological advantages but some of them has not been fully evaluated with respect to security. Security is considered one of the most critical aspects in cloud computing due to the sensitivity and importance of data stored in the cloud. Cloud Computing has several major issues
Security Aspects in Cloud Computing
"... Abstract — Cloud computing, sometime known as on-demand computing is one of the newest developments in the computer technology. Security in Cloud computing is a significant and critical aspect, associated with many issues and problems to use or deployment of it. The objective of this research contri ..."
Abstract
- Add to MetaCart
Abstract — Cloud computing, sometime known as on-demand computing is one of the newest developments in the computer technology. Security in Cloud computing is a significant and critical aspect, associated with many issues and problems to use or deployment of it. The objective of this research
Security Aspects of Cloud Computing
"... Cloud Computing is the new buzz word in today‟s computing world. Although there is huge buzz, many people are confused as to exactly what cloud computing is, especially as the term can be used to mean almost anything. The paper is categorized in three parts. The first part of this paper briefly expl ..."
Abstract
- Add to MetaCart
explains the cloud computing model. The second part of paper follows a discussion on what security threats and challenges pose in front of this technology. While the final part focuses on how virtualization plays an important role in cloud computing and talks about techniques for securing the virtual
MANET: Security Aspects and Challenges
"... Abstract -There have been a huge advancement in the field of wireless networks in last few decades. It gives new direction in the field of internet with its large number of applications. A mobile ad hoc network or MANET is self-configuring infrastructure less network of mobile device (laptops, smar ..."
Abstract
- Add to MetaCart
, smartphones, sensors, etc.) connects by wireless link. This type of network is standalone network. Security is a primary issue in order to provide secure communication in hostile environment. There are still some challenges associated with MANETS that needs to be overcome. These challenges includes routing
Security Aspects of Sensor Networks
"... Sensor networks are amassed wireless networks of small, low-cost sensors that collect and propagate environmental data. The emerging field of wireless sensor networks integrates sensing, computation, and communication into a single device. The power of wireless sensor networks verifies in the capabi ..."
Abstract
- Add to MetaCart
in the capability to deploy huge numbers of small nodes that collaborates and configure them. Wireless sensor networks simplify monitoring and handling of physical environments from remote locations with best accuracy. Security protocols associated to sensor network are analyzed in this paper.
Results 1 - 10
of
6,932