Security architecture

Results: 5312



#Item
131Computing / Concurrent computing / Cloud infrastructure / Parallel computing / Distributed computing architecture / Apache Software Foundation / MapReduce / Apache Hadoop / Data / Software Guard Extensions / Cloud computing

2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:59
132Computing / Network architecture / Internet / Cryptographic protocols / Secure communication / Transport Layer Security / Internet protocols / Internet Standards / HTTPS / Opportunistic TLS / Email client / Simple Mail Transfer Protocol

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
133Computing / Internet / Dark web / Internet security / Secure communication / Tor / Network architecture

Employment Application • THE BASICS • Name (last, first, middle)____________________________________________________ My Current Address _______________________________________________________________________________

Add to Reading List

Source URL: macrinabakery.com

Language: English - Date: 2013-09-05 18:30:59
134Computing / Web services / Enterprise application integration / Software / Architectural pattern / Service-oriented architecture / WS-Security / SOA Security / Security Assertion Markup Language / Software testing / XML appliance / Rational Service Tester for SOA Quality

Issue LIX • FebruaryFundamentals of SOA Security Testing by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article describes the foundations of SOA security testing including functional, performance, in

Add to Reading List

Source URL: www.servicetechmag.com

Language: English - Date: 2012-02-20 16:15:24
135Emerging technologies / Computing / Network architecture / Cloud infrastructure / Cloud computing / Technology / Internet of things / Network function virtualization / Software-defined networking / 9 / Cloud computing issues

NETEVENTS APAC PRESS & SERVICE PROVIDER VIP SUMMIT Draft Innovation in the Cloud & the Importance of Security Guest Speaker: Steve Chappell, Chief Operating Officer, Wedge

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2015-06-04 08:03:01
136Computing / Software / Smartphones / Computer architecture / Cloud clients / Mobile operating systems / Alphabet Inc. / Android / IOS / Proprietary software / Mobile security / Copyright

© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. The incident response playbook: For Android and iOS Andrew Hoog

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:34
137Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Zero-day / Computer virus / IObit

C A S E S T U DY SCB builds a defense against malware Architecture firm takes preventive approach to malware with Malwarebytes Anti-Malware and gains dramatic time savings Business profile

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
138Cryptography / Computer architecture / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Virtual private networks / Layer 2 Tunneling Protocol / Root certificate / Certificate authority / Control Panel

Microsoft Word - L2TP Windows XP OR VISTA.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:03
139Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
140Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
UPDATE