Security architecture

Results: 5312



#Item
371

The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau Uni

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
    372Internet protocols / Routing protocols / Internet standards / Border Gateway Protocol / Networking hardware / Internet backbone / Router / Backbone / Routing / Internet / Network architecture / Computing

    Poster: Resilience of the Internet: the Case of the BGP Backbone Sylvain Frey, Awais Rashid, Yehia Elkhatib, Karolina Follis, John Vidler, Nick Race, Chris Edwards Lancaster University {s.frey,a.rashid,y.elkhatib,k.folli

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:30
    373Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

    White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

    Add to Reading List

    Source URL: www.intel.es

    Language: English - Date: 2014-03-03 12:50:49
    374Software bugs / Pointer / X86 memory segmentation / C / X86 / Memory safety / 64-bit / Ring / Computing / Computer architecture / Software engineering

    Poster: Getting The Point(er): On the Feasibility of Attacks on Code-Pointer Integrity Volodymyr Kuznetsov∗ , L´aszl´o Szekeres† , Mathias Payer‡ , George Candea∗ , and Dawn Song§ ∗ Ecole ´

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:34
    375QEMU / Hyper-V / Hypervisor / Ring / Operating system / X86 / Xen / X Window System / System software / Software / Computer architecture

    Poster: P ODA RCH: Protecting Legacy Applications with a Purely Hardware TCB Shweta Shinde1 , Shruti Tople1 , Deepak Kathayat2 , Prateek Saxena1 National University of Singapore1 , IIIT Hyderabad2 {shweta24, shruti90, pr

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:30
    376Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / DNS root zone / DNS spoofing / Domain name system / Internet / Internet protocols

    Master Research Project Measuring the deployment of DNSSEC over the Internet Nicolas Canceill

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2015-05-30 08:14:06
    377Computer network security / Extranet / Network architecture

    AUGURE PACKAGES FOR AGENCIES From an small agency to an international company, Augure will allow you to improve the impact in your social network campaigns, boost the productivity of your consultants and show results to

    Add to Reading List

    Source URL: www.augure.com

    Language: English - Date: 2015-02-17 13:52:05
    378Ethernet / Computer network security / Computer network / Telecommunications engineering / Network switch / Denial-of-service attack / Network socket / IP address / Router / Computing / Network architecture / Internet

    MANUAL FOR A NEW STUDENT VILLAGE NETWORK USERUniversity of Turku, IT services Compiled by: Ville Ruohonen

    Add to Reading List

    Source URL: www.yok.fi

    Language: English - Date: 2015-05-11 01:39:02
    379Computer architecture / Android / Mobile apps / IOS / App Store / Smartphones / Software / Computing

    Support matrix Making the world safer, one app at a time. We provide a range of mobile app security solutions from scanning your app for

    Add to Reading List

    Source URL: www.riis.com

    Language: English - Date: 2015-07-16 10:44:59
    380Internet Protocol / Virtual private networks / Crypto-anarchism / Internet privacy / IPv6 / OpenVPN / Cisco 837 / Computer network security / Computing / Network architecture

    Technical Specification VPN Router ERT50 • •

    Add to Reading List

    Source URL: www.lyconsys.com

    Language: English - Date: 2014-09-29 05:17:21
    UPDATE