Security architecture

Results: 5312



#Item
351

Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers Hiroshi Fujinoki∗, Christopher A. Chelmecki, and David M. Henry Southern Illinois University Edwardsville Edwardsvill, Illinois, USA Abst

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2014-05-12 01:06:36
    352

    August 20, 2014 Privee: An Architecture for Automatically Analyzing Web Privacy Policies Sebastian Zimmeck and Steven M. Bellovin 23rd USENIX Security Symposium, San Diego, CA

    Add to Reading List

    Source URL: sebastianzimmeck.de

    Language: English - Date: 2014-12-04 00:22:06
      353Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

      Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

      Add to Reading List

      Source URL: unbound.nlnetlabs.nl

      Language: English - Date: 2008-05-19 08:09:35
      354Computing / Internet / Network architecture / Tor / Internet Standards / Internet protocols / Dark web / Internet security / Anonymity / Peer-to-peer / Red team / The Tor Project /  Inc

      Collaborative Red Teaming for Anonymity System Evaluation Sandy Clark◦ Chris Wacek• Matt Blaze◦ Boon Thau Loo◦ Micah Sherr• Clay Shields• Jonathan Smith◦ ◦ University of Pennsylvania

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2012-08-16 08:18:23
      355Computing / Internet / Network architecture / Dark web / Internet Standards / Internet security / Secure communication / Tor / Routing / Proxy server / Low latency / Onion routing

      An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2012-12-16 11:56:26
      356Computing / Software / Computer architecture / Computing platforms / Smartphones / Alphabet Inc. / Android / Intent / Microsoft App-V

      Android Application Security Assessments By Michael Born © 2014 Solutionary, Inc.

      Add to Reading List

      Source URL: www.nebraskacert.org

      Language: English - Date: 2014-03-19 23:26:27
      357Domain name system / Internet / Computing / Network architecture / Domain Name System Security Extensions / OpenDNSSEC / Unbound / NSD / NLnet / DNS-based Authentication of Named Entities / Root name server / Name server

      Annual Report 2014 For an Open Internet CopyrightNLnet Labs.

      Add to Reading List

      Source URL: nlnetlabs.nl

      Language: English - Date: 2015-10-26 11:07:38
      358Computing / Business / Technology / Web development / Mashup / Software architecture / Web 2.0 / World Wide Web / Cryptography / National Security Agency / IBM / Web portal

      PDF Document

      Add to Reading List

      Source URL: w2spconf.com

      Language: English - Date: 2012-02-07 16:10:03
      359Computing / Network architecture / Computer network security / Network protocols / Computer networking / Networking hardware / Router / Server appliance / Port forwarding / Universal Plug and Play / IP address / Virtual Router Redundancy Protocol

      PDF Document

      Add to Reading List

      Source URL: cetoncorp.com

      Language: English - Date: 2013-01-17 16:01:28
      360Computer security / Computer architecture / Computing / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Lynx Software Technologies / Kernel / Lockheed Martin / MLS / Guard / Protection ring

      PDF Document

      Add to Reading List

      Source URL: swa.omg.org

      Language: English - Date: 2006-12-14 08:55:42
      UPDATE