Internet security architecture
R Molva - Computer Networks, 1999 - Elsevier
… of Internet using firewalls. This paper discusses the current cryptographic security measures
available for the Internet … resource records as identified by the `Type covered' sub-field in the …
available for the Internet … resource records as identified by the `Type covered' sub-field in the …
[BOOK][B] Internet security for business
T Bernstein, AB Bhimani, E Schultz, CA Siegel - 1996 - dl.acm.org
… My lasting impression is that the wide variety of security threats and their consequences
are scary. The large amounts of knowledge and resources required to combat the threats are …
are scary. The large amounts of knowledge and resources required to combat the threats are …
Internet attack methods and internet security technology
O Adeyinka - 2008 Second Asia International Conference on …, 2008 - ieeexplore.ieee.org
… officer that decides who is allowed and who is disallowed access to a particular resource …
in activities on the Internet. This paper presents a security solution for Internet security. …
in activities on the Internet. This paper presents a security solution for Internet security. …
[HTML][HTML] Internet security glossary, version 2
R Shirey - 2007 - rfc-editor.org
… control for a system resource by enumerating the system entities that are permitted to access
the resource and stating, either … security services and violate the security policy of a system. …
the resource and stating, either … security services and violate the security policy of a system. …
A survey on future Internet security architectures
… Internet from a clean slate. In order to obtain a thorough knowledge of security in future
Internet … sTreaming, MobilityFirst Future Internet Architecture Project (MobilityFirst), eXpressive …
Internet … sTreaming, MobilityFirst Future Internet Architecture Project (MobilityFirst), eXpressive …
Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices
F Lin, Y Zhou, X An, I You… - IEEE Consumer …, 2018 - ieeexplore.ieee.org
… with multiples resources, we use DRF to allocate all available resources. Max–min fair (MMF)
is then used to allocate remainder resources. In this way, the resource allocation efficiency …
is then used to allocate remainder resources. In this way, the resource allocation efficiency …
[BOOK][B] Internet and intranet security
R Oppliger - 2001 - books.google.com
… • The aim of computer security is to preserve resources (eg, data that encodes information) …
everyone on the Internet is vulnerable, and that the Internet's security problems are the center …
everyone on the Internet is vulnerable, and that the Internet's security problems are the center …
The Internet of Things: a security point of view
… security shall has some similarity to the internet security in that they both shall have the
security protocols but the social IoT security … the lightweight cryptography in resource-constrained …
security protocols but the social IoT security … the lightweight cryptography in resource-constrained …
Cyber security framework for Internet of Things-based Energy Internet
… Internet (EI) also known as the integrated internet-based smart grid and energy resources
inherits all the security … AVISPA is a tool for analysing and verifying internet security protocols, …
inherits all the security … AVISPA is a tool for analysing and verifying internet security protocols, …
Security of the Internet of Things: perspectives and challenges
Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… In local area network, we analyzed network access control technology to solve the
security issue of illegally network resources usage. We also analyzed some common …
security issue of illegally network resources usage. We also analyzed some common …