Security architecture

Results: 5312



#Item
621Central processing unit / Coprocessor / Acorn Computers / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / IBM / HTTP cookie / Cryptography / Computing / Computer architecture

Practical server privacy with secure coprocessors by S. W. Smith D. Safford

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:48:27
622Distributed computing / Node

Security in WebCom: Addressing Naming Issues for a Web Services Architecture Thomas B. Quillinan Simon N. Foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:00:23
623Computer network security / Hacking / Internet ethics / Network architecture / Domain Name System / BIND / DNS spoofing / Email spam / Spamming / Computing / Internet

Implications of SIE Paul Vixie, ISC ISC/CAIDA Workshop @M3AAWG October 2012 SIE Characteristics

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:52
624Computer network security / Sandbox / JavaScript / ECMAScript / Computer security / Caja project / Same origin policy / Computing / Software / Scripting languages

A Two-Tier Sandbox Architecture for Untrusted JavaScript ∗ Phu H. Phung Lieven Desmet

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-05-30 05:23:58
625Server Admin / Transmission Control Protocol / Network architecture / Stateful firewall / Open port / Computer network security / Computing / Firewall

Teamsoft : TeamAgenda and Firewall Additional Information Introduction This document present information for accessing TeamAgenda via a Firewall. I would like to access my TeamAgenda Server from a remote location. Which

Add to Reading List

Source URL: www.teamsoft.com

Language: English - Date: 2007-03-02 13:14:58
626Internet protocols / Routing / Internet standards / DNSSEC / Domain Name System Security Extensions / IPv6 / Router / Darknet / Default route / Network architecture / Internet / Computing

Turning  Down  the  Lights:   Darknet  Deployment  Lessons  Learned   Casey  Deccio   DUST1st International Workshop on Darkspace and UnSolicited Traffic Analysis May 14, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
627Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Extension mechanisms for DNS / Name server / Transmission Control Protocol / Domain name system / Internet / Network architecture

Measuring the effects of DNSSEC deployment on query load Jelte Jansen∗ NLnet Labs May 1, 2006

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
628Network architecture / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Internet

CR300iNG Future-ready Future-ready Security for SME networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:53
6296to4 / ISATAP / Mobile IP / Secure Neighbor Discovery Protocol / IP address / Cryptographically Generated Address / ICMPv6 / Teredo tunneling / 6in4 / Internet Protocol / IPv6 / Network architecture

IPv6 Security Briefing (half day) Understanding the new security issues introduced by IPv6 and the actions you should take.

Add to Reading List

Source URL: www.erion.co.uk

Language: English - Date: 2015-01-08 05:46:46
630Computing / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server / NSD / Domain name system / Internet / Network architecture

Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Add to Reading List

Source URL: unbound.net

Language: English - Date: 2008-05-19 08:09:35
UPDATE