Internet security architecture

R Molva - Computer Networks, 1999 - Elsevier
… of Internet using firewalls. This paper discusses the current cryptographic security measures
available for the Internetresource records as identified by the `Type covered' sub-field in the …

[BOOK][B] Internet security for business

T Bernstein, AB Bhimani, E Schultz, CA Siegel - 1996 - dl.acm.org
… My lasting impression is that the wide variety of security threats and their consequences
are scary. The large amounts of knowledge and resources required to combat the threats are …

Internet attack methods and internet security technology

O Adeyinka - 2008 Second Asia International Conference on …, 2008 - ieeexplore.ieee.org
… officer that decides who is allowed and who is disallowed access to a particular resource
in activities on the Internet. This paper presents a security solution for Internet security. …

[HTML][HTML] Internet security glossary, version 2

R Shirey - 2007 - rfc-editor.org
… control for a system resource by enumerating the system entities that are permitted to access
the resource and stating, either … security services and violate the security policy of a system. …

A survey on future Internet security architectures

W Ding, Z Yan, RH Deng - IEEE Access, 2016 - ieeexplore.ieee.org
Internet from a clean slate. In order to obtain a thorough knowledge of security in future
Internet … sTreaming, MobilityFirst Future Internet Architecture Project (MobilityFirst), eXpressive …

Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices

F Lin, Y Zhou, X An, I You… - IEEE Consumer …, 2018 - ieeexplore.ieee.org
… with multiples resources, we use DRF to allocate all available resources. Max–min fair (MMF)
is then used to allocate remainder resources. In this way, the resource allocation efficiency …

[BOOK][B] Internet and intranet security

R Oppliger - 2001 - books.google.com
… • The aim of computer security is to preserve resources (eg, data that encodes information) …
everyone on the Internet is vulnerable, and that the Internet's security problems are the center …

The Internet of Things: a security point of view

S Li, T Tryfonas, H Li - Internet Research, 2016 - emerald.com
security shall has some similarity to the internet security in that they both shall have the
security protocols but the social IoT security … the lightweight cryptography in resource-constrained …

Cyber security framework for Internet of Things-based Energy Internet

AS Sani, D Yuan, J Jin, L Gao, S Yu, ZY Dong - Future Generation …, 2019 - Elsevier
Internet (EI) also known as the integrated internet-based smart grid and energy resources
inherits all the security … AVISPA is a tool for analysing and verifying internet security protocols, …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… In local area network, we analyzed network access control technology to solve the
security issue of illegally network resources usage. We also analyzed some common …