Security architecture

Results: 5312



#Item
251Domain name system / Internet / Computing / Network architecture / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / Root name server / Time to live

Resolver Analysis for a Signed Root NLnet Labs documentversion 06. June 22, 2009 Abstract

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
252

The Benefits of Digital Signatures for Reducing Bank Fraud Losses An Overview of the Certicom Security Architecture for Check 21 February 2005 Introduction

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2008-02-26 14:48:31
    253

    IIC Quarterly Report: Februarywas a busy year: publication of the Industrial Internet Reference Architecture in June, ongoing work on the Security Framework, creation of a new Working Group, Business Strategy

    Add to Reading List

    Source URL: www.iiconsortium.org

    Language: English - Date: 2016-02-18 10:39:29
      254

      Security Connected Reference Architecture Solution Guide Disrupt Targeted Attacks Synthesize IT operations and security controls into an agile architecture.

      Add to Reading List

      Source URL: www.mcafee.com

      Language: English - Date: 2015-08-19 16:06:02
        255Software / System software / Computer architecture / FreeBSD / Chroot / FreeBSD jail / Procfs / Root directory / Unix security / Securelevel / Operating system / File system

        Jails: Confining the omnipotent root. Poul-Henning Kamp <> Robert N. M. Watson <> The FreeBSD Project ABSTRACT

        Add to Reading List

        Source URL: us-east.manta.joyent.com

        Language: English - Date: 2016-01-19 17:45:24
        256Computing / Computer access control / Software / Identity management / Federated identity / Java enterprise platform / Java platform / OpenAM / ForgeRock / OpenDJ / Single sign-on / Security Assertion Markup Language

        CASE STUDY: PLUS RETAIL AXI ITS, a ForgeRock partner, Implements a Federated SSO Architecture for PLUS Retail About PLUS Retail PLUS Retail is a subsidiary of Sparrowhawk Group, an organization run by and for independen

        Add to Reading List

        Source URL: www.forgerock.com

        Language: English - Date: 2015-06-10 15:46:52
        257Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

        Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

        Add to Reading List

        Source URL: www.nlnetlabs.nl

        Language: English - Date: 2009-06-27 06:06:52
        258

        Architecture-­‐level  Security  Issues     for  main  memory   Ali  Shafiee   Aganda   •  Replay-­‐A;ack  

        Add to Reading List

        Source URL: www.eng.utah.edu

        Language: English - Date: 2015-10-07 16:52:04
          259Internet security / Internet protocol suite / Network architecture / CVSS / POODLE / Nessus / OpenSSL

          Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed:

          Add to Reading List

          Source URL: rsync.net

          Language: English - Date: 2015-06-08 23:32:29
          260Software / Computer architecture / System software / System calls / Inter-process communication / Application programming interfaces / Kernel / Seccomp / HAL / Chroot / Sandbox / Potential applications of graphene

          Cooperation and Security Isolation of Library OSes for Multi-Process Applications Chia-Che Tsai Kumar Saurabh Arora Nehal Bandi Bhushan Jain

          Add to Reading List

          Source URL: www3.cs.stonybrook.edu

          Language: English - Date: 2014-03-28 07:32:49
          UPDATE