Security analysis

Results: 6956



#Item
891Computing / Identity management / RDF / Context awareness / PERMIS / Policy analysis / Ontology / Role-based access control / Web Ontology Language / Security / Semantic Web / Access control

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments Alessandra Toninelli1, Rebecca Montanari1, Lalana Kagal2, and Ora Lassila3, 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-09-07 14:22:35
892National security / Videotelephony / Privacy of telecommunications / Privacy law / Communications Assistance for Law Enforcement Act / Mass surveillance / Telephone tapping / Voice over IP / SMS / Electronic engineering / Technology / Surveillance

Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

Add to Reading List

Source URL: www.wired.com

Language: English - Date: 2009-11-12 12:55:05
893Electronic commerce / Certificate authorities / Comodo Group / Key management / Identity management / Identity theft / Identity assurance / Authentication / Online shopping / Cryptography / Security / Identity

Identity & Trust Assurance Market Analysis The next generation technologies to Create Trust Online Identity & Trust Assurance Market Analysis

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:19
894C programming language / Deduction / Java programming language / Initialization / Final / Objective-C / Entailment / Struct / Data-flow analysis / Software engineering / Computer programming / Logic

1 Securing Class Initialization in Java-like Languages Willard Rafnsson, Keiko Nakata, and Andrei Sabelfeld Abstract—Language-based information-flow security is concerned with specifying and enforcing security policie

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-08-22 04:05:38
895Statistical forecasting / Computational science / European Space Agency / Data assimilation / Estimation theory / Global Monitoring for Environment and Security / ERA-40 / Global climate model / Numerical weather prediction / Atmospheric sciences / Meteorology / Weather prediction

ESA/DUE GlobModel Project Final Analysis Report Assimila, Deliverable D4, Version 2.1

Add to Reading List

Source URL: www.globmodel.info

Language: English - Date: 2014-11-03 08:46:34
896Military intelligence / Intelligence analysis / Cyberwarfare / Intelligence gathering disciplines / Counterintelligence / Industrial espionage / Central Intelligence Agency / Robert Hanssen / Spy / Espionage / National security / Counter-intelligence

 .C. Carleson was an undercover CIA officer for eight years. Adapted from Work Like a Spy: Business Tips From a Former CIA Officer (Portfolio/ ■ J Penguin). ©J.C. Carleson, 2013. Understanding the price of business

Add to Reading List

Source URL: www.tcbreview.com

Language: English - Date: 2013-04-04 17:42:21
897Android / Embedded Linux / Google / Android software development / Android Market / Widget / Graphical user interface / Java / GUI widget / Software / Computing / Smartphones

AppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen, and William Enck† Northwestern University, † North Carolina State University , ychen@northw

Add to Reading List

Source URL: www.enck.org

Language: English
898Computing / DNS spoofing / Domain Name System Security Extensions / DNS zone / Name server / Anycast / Domain name / Comparison of DNS server software / Split-horizon DNS / Domain name system / Internet / Network architecture

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
899Computer security / Windows NT / Windows Server / Log analysis / Event Viewer / Microsoft Servers / Event data / Windows / System Center Operations Manager / Software / System software / Computing

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
900UK Threat Levels / Joint Terrorism Analysis Centre / Computer security / Threat / Security / Vulnerability / Terrorism in the United Kingdom / Military communications / Cyberwarfare

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN

Add to Reading List

Source URL: www.roe.ac.uk

Language: English - Date: 2009-08-21 12:15:09
UPDATE