Security analysis

Results: 6956



#Item
451

36 International Journal of Information Security and Privacy, 7(3), 36-52, July-SeptemberA Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

Add to Reading List

Source URL: www.tyronegrandison.org

Language: English - Date: 2013-12-05 23:52:20
    452Computer security / Business / Risk analysis / Data security / Computing / Supply chain management / Supply chain risk management / National Institute of Standards and Technology / Security controls / Open Trusted Technology Provider Standard

    ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-15 11:08:27
    453

    An Analysis of High-Perfromance Primes at High-Security Levels

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-12 12:10:58
      454

      Automating security analysis: symbolic equivalence of constraint systems ? Vincent Cheval, Hubert Comon-Lundh, and St´ephanie Delaune LSV, ENS Cachan & CNRS & INRIA Saclay ˆIle-de-France Abstract. We consider security

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2011-08-02 11:02:31
        455Military / NATO / Military units and formations of NATO / Allied Command Transformation / International Security Assistance Force / Supreme Headquarters Allied Powers Europe / Joint Analysis and Lessons Learned Centre / Joint Warfare Centre / NATO Response Force / Structure of NATO

        THE SKOLKAN SETTING COMPREHENSIVENESS AND COMPLEXITY Report Published on 17 February 2014 PROJECT FACTSHEET

        Add to Reading List

        Source URL: www.jallc.nato.int

        Language: English - Date: 2015-10-02 10:24:13
        456

        Vulnerability Analysis and Attacks  on NFC­enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security

        Add to Reading List

        Source URL: www.mulliner.org

        Language: English - Date: 2010-10-15 05:51:29
          457

          Large-scale DNS and DNSSEC data sets for network security research Roland van Rijswijk-Deij1,2 , Anna Sperotto1 , and Aiko Pras1 1 Design and Analysis of Communication Systems (DACS), University of Twente,

          Add to Reading List

          Source URL: wwwhome.ewi.utwente.nl

          Language: English - Date: 2016-02-02 09:35:49
            458

            Technical Assessment and Assurance Practice Specialist IT security services including, threat analysis, vulnerability assessment and solution design The world is changing at pace, and so too are the

            Add to Reading List

            Source URL: www.senseofsecurity.com.au

            Language: English - Date: 2015-01-12 00:59:37
              459Military / NATO / Military units and formations of NATO / Joint Analysis and Lessons Learned Centre / Military of Portugal / Civil-military co-operation / International Security Assistance Force / Lessons learned

              JOINT ANALYSIS AND LESSONS LEARNED CENTRE LISBON, PORTUGAL Volume 2, Issue 1 January 2011

              Add to Reading List

              Source URL: www.jallc.nato.int

              Language: English - Date: 2015-10-02 10:24:32
              460

              Security Analysis of a Cryptographically-Enabled RFID Device Stephen C. Bono∗ Matthew Green∗

              Add to Reading List

              Source URL: www.arijuels.com

              Language: English - Date: 2013-09-24 11:11:31
                UPDATE