Infrastructure security

Results: 6100



#Item
401Cloud infrastructure / Cloud computing

2014 ACM Cloud Computing Security Workshop (CCSW) 7 November 2014, Scottsdale, Arizona, USA In conjunction with the ACM CCS Conference http://digitalpiglet.org/nsac/ccsw14 Notwithstanding the latest buzzword (grid, cloud

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2014-07-21 10:47:47
402

Security Economics and Critical National Infrastructure Ross Anderson, Shailendra Fuloria Cambridge University Computer Laboratory

Add to Reading List

Source URL: weis09.infosecon.net

Language: English - Date: 2013-09-01 23:23:37
    403

    An attack-resilient Grid aUditing infrastructure Christopher Kunz, Jan Wiebelitz and Matthew Smith Distributed Computing Security Group Gottfried Wilhelm Leibniz Universitaet / L3S Hannover, Germany

    Add to Reading List

    Source URL: www.dcsec.uni-hannover.de

    Language: English - Date: 2011-09-19 07:48:52
      404Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

      Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2012-11-08 10:00:02
      405

      Education Tablets are being increasingly used by schools for both teachers and students, but Bring Your Own Tech (BYOT) presents licensing, management, infrastructure, security and oversight challenges. “BYOT initiativ

      Add to Reading List

      Source URL: www.hypori.com

      Language: English
        406Infrastructure / United States Department of Homeland Security / Federal Emergency Management Agency / HAZUS / OpenStreetMap / Critical infrastructure / Oncostatin M / Technology / Government / Science and technology

        ISCRAM2015_Conference_PaperTemplate.docx

        Add to Reading List

        Source URL: www.agora.icmc.usp.br

        Language: English - Date: 2015-04-13 14:27:45
        407Cloud infrastructure / Cloud computing / Computer security / Scaled Agile Framework / Private banking

        Microsoft Word - Investglass_Case Study_page1

        Add to Reading List

        Source URL: investglass.com

        Language: English - Date: 2015-05-03 11:48:11
        408Computer security / Security / Insider threat / Salvatore J. Stolfo / Insider / Institute for Information Infrastructure Protection / Threat / Cyber Insider Threat / Insider trading

        Guest Editors’ Introduction Addressing the Insider Threat A

        Add to Reading List

        Source URL: ids.cs.columbia.edu

        Language: English - Date: 2011-09-04 10:44:35
        409Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

        The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

        Add to Reading List

        Source URL: www.cs.columbia.edu

        Language: English - Date: 2012-03-22 16:55:00
        410Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate authorities / Root certificate / Extended Validation Certificate / Public key certificate / Android / X.509 / CAcert.org

        A Tangled Mass: The Android Root Certificate Stores Narseo Vallina-Rodriguez Johanna Amann Christian Kreibich

        Add to Reading List

        Source URL: conferences2.sigcomm.org

        Language: English - Date: 2014-12-01 16:56:17
        UPDATE