Security architecture

Results: 5312



#Item
301Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-03-22 16:55:00
302

Outline Introduction (Open)Office security architecture Fun and Profit - How to Bypass (Open)Office security Conclusion

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-29 15:08:46
    303Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

    VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2011-10-24 00:14:43
    304Computer security / Computing / Trusted computing / Cryptography / Trusted Execution Technology / X86 architecture / Trusted Platform Module / Monitor / Futures and promises / Trusted computing base / Polymerase chain reaction / Thread

    A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2009-06-02 14:26:22
    305Software / Computing / Computer networking / Named data networking / Computer network security / Cyberwarfare / Network architecture / Synchronization / DOS Navigator / Internet protocol suite / Google Chrome / Computer security

    Microsoft Word - icnt44-ben-abraham

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:10:15
    306Computing / Network architecture / Computer network security / Emerging technologies / Network protocols / OpenFlow / Middlebox / Software-defined networking / Engineering / Computer network / Provisioning / Technology

    A Slick Control Plane for Network Middleboxes Bilal Anwer Theophilus Benson Georgia Tech

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2013-07-08 16:07:10
    307Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis

    Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

    Add to Reading List

    Source URL: www.vanbever.eu

    Language: English - Date: 2014-10-08 09:38:20
    308

    The Design of a Cryptographic Security Architecture Peter Gutmann University of Auckland, New Zealand The Problem...

    Add to Reading List

    Source URL: www.cs.auckland.ac.nz

    Language: English - Date: 1999-08-30 14:35:26
      309Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

      strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2007-05-26 10:12:50
      310Computing / Network architecture / Computer network security / Information technology management / Configuration management / Software-defined networking / OpenFlow / Controller / Stateful firewall / Open vSwitch / Firewall / Control theory

      HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English - Date: 2013-06-13 09:26:16
      UPDATE