To see the other types of publications on this topic, follow the link: Applications security.

Journal articles on the topic 'Applications security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Applications security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pita, James, Harish Bellamane, Manish Jain, et al. "Security applications." ACM SIGecom Exchanges 8, no. 2 (2009): 1–4. http://dx.doi.org/10.1145/1980522.1980527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Erbel, Mateusz, and Piotr Kopniak. "Assessment of the web application security effectiveness against various methods of network attacks." Journal of Computer Sciences Institute 9 (December 30, 2018): 340–44. http://dx.doi.org/10.35784/jcsi.707.

Full text
Abstract:
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications. The research methodology was based on the proprietary application implemented in PHP technology. The result of the research is a proposal of solutions aimed at improving application security.
APA, Harvard, Vancouver, ISO, and other styles
3

Karakaneva, J. "Software applications security." Trakia Journal of Science 12, no. 4 (2014): 418–24. http://dx.doi.org/10.15547/tjs.2014.04.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kamil, Mustofa. "Methodology of Security testing of IKID website and Security Vulnerabilities." ACMIT Proceedings 6, no. 1 (2021): 83–90. http://dx.doi.org/10.33555/acmit.v6i1.101.

Full text
Abstract:
Due to the large amount of data stored in web applications and the increasing number of transactions on the web, the right Web Application Security Testing is very important day by day and web application is an important in business life. By increasing complexity of web systems, Security testing has become a very necessary and important activity of the life cycle of developing web applications, web security testing consists of searching for information about the network, application and looking for holes and weakness.
APA, Harvard, Vancouver, ISO, and other styles
5

Jovicic, Bojan, and Dejan Simic. "Common web application attack types and security using ASP.NET." Computer Science and Information Systems 3, no. 2 (2006): 83–96. http://dx.doi.org/10.2298/csis0602083j.

Full text
Abstract:
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situation in IT environment. ASP.NET offers powerful mechanisms to render these attacks futile, but it requires some knowledge of implementing Web application security. This paper focuses on attacks against Web applications, either to gain direct benefit by collecting private information or to disable target sites. It describes the two most common Web application attacks: SQL Injection and Cross Site Scripting, and is based
APA, Harvard, Vancouver, ISO, and other styles
6

Misnik, Oleksii. "Applications containers security model." Collection "Information Technology and Security" 8, no. 1 (2020): 58–66. http://dx.doi.org/10.20535/2411-1031.2020.8.1.218004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thuraisingham, Bhavani, and Reind van de Riet. "Data and applications security." Data & Knowledge Engineering 43, no. 3 (2002): 235–36. http://dx.doi.org/10.1016/s0169-023x(02)00125-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, S. J. S. "Security applications of holography." Physics in Technology 17, no. 5 (1986): 205–11. http://dx.doi.org/10.1088/0305-4624/17/5/i03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware pla
APA, Harvard, Vancouver, ISO, and other styles
10

Agrawal, Alka, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan. "A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications." Symmetry 12, no. 3 (2020): 448. http://dx.doi.org/10.3390/sym12030448.

Full text
Abstract:
Although security is an integral aspect of any web application’s growth, sustainability is also a pivotal factor in maintaining the web application. It is clear that the software industry aims to develop different methods and initiatives for achieving high security while maintaining high sustainability. Unfortunately, web application protection is useless if the sustainability is low. Thus, the present day need calls for innovation in developing web applications that afford sustainable-security to the users. By improving sustainability along with web application protection, underlying security
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Xin, De Lin Chen, Yue Sun, Xu Wang, and Su Ying Yao. "Security Control for TVOS." Applied Mechanics and Materials 643 (September 2014): 136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.643.136.

Full text
Abstract:
Smart TV terminals have become an emerging platform for both personal and business application. Security for applications running on smart TV terminals is important .In this paper we present TVOS, a new OS for enabling high assurance applications to run on smart TV terminal securely. Our main contributions are a new OS architecture and our use of formal methods for proving key security invariants about our implementation. As an operating system, TVOS is still relatively young. To analyze its security and tested its performance. Our evaluation shows that the performance of TVOS is comparable to
APA, Harvard, Vancouver, ISO, and other styles
12

Alrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.

Full text
Abstract:
The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing
APA, Harvard, Vancouver, ISO, and other styles
13

Adane, D. S., and S. R. Sathe. "A Security Model for Securing Data in Multiagent Applications." Information Security Journal: A Global Perspective 19, no. 1 (2010): 11–21. http://dx.doi.org/10.1080/19393550903534088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Qiu, Qin, Shenglan Liu, Sijia Xu, and Shengquan Yu. "Study on Security and Privacy in 5G-Enabled Applications." Wireless Communications and Mobile Computing 2020 (December 19, 2020): 1–15. http://dx.doi.org/10.1155/2020/8856683.

Full text
Abstract:
5G applications face security risks due to the new technology used and the performance requirements of the specific application scenario. This paper analyzes the security requirements and presents hierarchical solutions for stakeholders to build secure 5G applications. First, we summarize the technical characteristics and typical usage scenarios of 5G. Then, we analyze the security and privacy risks faced by 5G applications and related security standards and research work. Next, we give the system reference architecture and overall security and privacy solutions for 5G applications. Based on t
APA, Harvard, Vancouver, ISO, and other styles
15

Heyman, Andrew, Leon Reznik, Michael Negnevitsky, and Andrew Hoffman. "Fuzzy System Design for Security and Environment Control Applications." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 23, Suppl. 1 (2015): 43–56. http://dx.doi.org/10.1142/s0218488515400048.

Full text
Abstract:
As the amount of data available to researchers continues to grow, sharp class distinctions generated through Boolean logic fundamentally limit researchers' abilities to adequately process data into useable information. The application of fuzzy systems to real world problems allows us to synthesize this raw data into meaningful results. This paper demonstrates how fuzzy theory can be applied to real life application's design where rules can be generated explicitly through an expert system, or implicitly derived through a hybrid neural-fuzzy system. The paper illustrates the success of the fuzzy
APA, Harvard, Vancouver, ISO, and other styles
16

A.P, Dr Nirmala. "Security Threats and Mitigation Approaches in IoT based Applications." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 6948–54. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hall, Calum, Lynsay Shepherd, and Natalie Coull. "BlackWatch: Increasing Attack Awareness within Web Applications." Future Internet 11, no. 2 (2019): 44. http://dx.doi.org/10.3390/fi11020044.

Full text
Abstract:
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security. While prevention is an essential part of the security process, developers must also implement a level of attack awareness into their web applications. Being able to detect when an attack is occurring provides applications with the ability to execute responses against malicious users in an attempt to slow down or deter their attacks. T
APA, Harvard, Vancouver, ISO, and other styles
18

Andrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.

Full text
Abstract:
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are
APA, Harvard, Vancouver, ISO, and other styles
19

Rajendran, Jeyavijayan, Ramesh Karri, James B. Wendt, et al. "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications." Proceedings of the IEEE 103, no. 5 (2015): 829–49. http://dx.doi.org/10.1109/jproc.2014.2387353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Dutta-Roy, Amitava. "Nano meets security: Exploring nanoelectronic devices for security applications." Proceedings of the IEEE 103, no. 5 (2015): 822–28. http://dx.doi.org/10.1109/jproc.2015.2418512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Alzahrani, Abdulrahman, Ali Alqazzaz, Nabil Almashfi, Huirong Fu, and Ye Zhu. "Web Application Security Tools Analysis." Studies in Media and Communication 5, no. 2 (2017): 118. http://dx.doi.org/10.11114/smc.v5i2.2663.

Full text
Abstract:
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning, not only because of the many tools that are available but also because of the industry immaturity. Thus, finding the proper tools requires deep understanding and several steps, including analyzing the development environment, business needs, and the web applications’ complexity. In this paper, we demonstrate the architecture of web applicatio
APA, Harvard, Vancouver, ISO, and other styles
22

Abdel-Kader, Rabab F., Mona Nashaat, Mohamed I. Habib, and Hani M. K. Mahdi. "Automated server-side model for recognition of security vulnerabilities in scripting languages." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6061. http://dx.doi.org/10.11591/ijece.v10i6.pp6061-6070.

Full text
Abstract:
With the increase of global accessibility of web applications, maintaining a reasonable security level for both user data and server resources has become an extremely challenging issue. Therefore, static code analysis systems can help web developers to reduce time and cost. In this paper, a new static analysis model is proposed. This model is designed to discover the security problems in scripting languages. The proposed model is implemented in a prototype SCAT, which is a static code analysis Tool. SCAT applies the phases of the proposed model to catch security vulnerabilities in PHP 5.3. Emp
APA, Harvard, Vancouver, ISO, and other styles
23

., Awantika, Neha Rawat, Poonam Rawat, and Shikha Singh. "Cloud Computing: Security and Applications." i-manager's Journal on Cloud Computing 1, no. 2 (2014): 1–6. http://dx.doi.org/10.26634/jcc.1.2.3045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mitrea, Teodor, Vlad Vasile, and Monica Borda. "Mobile Applications - (in) Security Overview." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.

Full text
Abstract:
Abstract Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, u
APA, Harvard, Vancouver, ISO, and other styles
25

Wu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

A. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Desrosiers, Marc F. "Irradiation applications for homeland security." Radiation Physics and Chemistry 71, no. 1-2 (2004): 479–82. http://dx.doi.org/10.1016/j.radphyschem.2004.03.084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dwan, Berni. "Smart card security and applications." Computer Fraud & Security 1998, no. 10 (1998): 18–19. http://dx.doi.org/10.1016/s1361-3723(98)80028-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Hendry, Mike. "Smart Card Security and Applications." EDPACS 25, no. 11 (1998): 18. http://dx.doi.org/10.1201/1079/43233.25.11.19980501/30169.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ripka, Pavel. "Security applications of magnetic sensors." Journal of Physics: Conference Series 450 (June 26, 2013): 012001. http://dx.doi.org/10.1088/1742-6596/450/1/012001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ting, T. C. "Modeling security requirements for applications." ACM SIGPLAN Notices 28, no. 10 (1993): 305. http://dx.doi.org/10.1145/167962.165912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gallery, Eimear, and Chris J. Mitchell. "Trusted Computing: Security and Applications." Cryptologia 33, no. 3 (2009): 217–45. http://dx.doi.org/10.1080/01611190802231140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hawrami, R., L. Soundara Pandian, E. Ariesanti, et al. "Crystals for Nuclear Security Applications." IEEE Transactions on Nuclear Science 63, no. 2 (2016): 509–12. http://dx.doi.org/10.1109/tns.2016.2522188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Noor. "E-COMMERCE: SECURITY AND APPLICATIONS." American Journal of Applied Sciences 9, no. 11 (2012): 1868–71. http://dx.doi.org/10.3844/ajassp.2012.1868.1871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pang, Yachuan, Bin Gao, Bohan Lin, He Qian, and Huaqiang Wu. "Memristors for Hardware Security Applications." Advanced Electronic Materials 5, no. 9 (2019): 1800872. http://dx.doi.org/10.1002/aelm.201800872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Becidyan, A. Nurhan. "Luminescent pigments in security applications." Color Research & Application 20, no. 2 (1995): 124–30. http://dx.doi.org/10.1002/col.5080200208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Saleem, Muhammad Qaiser. "Security Problems of SOA Applications." International Journal of Security and Its Applications 11, no. 11 (2017): 31–40. http://dx.doi.org/10.14257/ijsia.2017.11.11.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sage, K., and S. Young. "Security applications of computer vision." IEEE Aerospace and Electronic Systems Magazine 14, no. 4 (1999): 19–29. http://dx.doi.org/10.1109/62.756080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Leng, Xuefei. "Smart card applications and security." Information Security Technical Report 14, no. 2 (2009): 36–45. http://dx.doi.org/10.1016/j.istr.2009.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Munoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.

Full text
Abstract:
Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers. This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. A total of 62,685 records were downloaded from the Web of Science (WoS) and Scopus core databases and processed, reconciling the datasets to remove duplicates, resulting in 40,677 unique elements. Fundamental indicators were extracted and are presented, such as the citation numbe
APA, Harvard, Vancouver, ISO, and other styles
41

Ukil, Arijit, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal, and Tulika Bose. "Lightweight security scheme for IoT applications using CoAP." International Journal of Pervasive Computing and Communications 10, no. 4 (2014): 372–92. http://dx.doi.org/10.1108/ijpcc-01-2014-0002.

Full text
Abstract:
Purpose – The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshakin
APA, Harvard, Vancouver, ISO, and other styles
42

Halili, Festim, and Lirie Koraqi. "The Security Aspect of Applications in Kosovo Companies." Modern Applied Science 13, no. 1 (2018): 221. http://dx.doi.org/10.5539/mas.v13n1p221.

Full text
Abstract:
This paper addresses the security aspects of the software applications in the framework of several entrepreneurship. It has a certain goal and structure, through which it modestly aims to present the security aspect of web applications in Kosovo companies. At first we tried to give some theoretical concepts about security in general and security testing in particular. The key research elaboration of the research problem addresses the security aspect in the sector of companies that develop applications and do their testing, here we will dwell on a case-study case of different companies in Kosov
APA, Harvard, Vancouver, ISO, and other styles
43

Bwalya, Michael, and Christopher Chembe. "A Security Framework for Mobile Application Systems: Case of Android Applications." Zambia ICT Journal 3, no. 2 (2020): 31–43. http://dx.doi.org/10.33260/zictjournal.v3i2.84.

Full text
Abstract:
Smartphones have become a major part of human’s life. And also it has been seen that new mobile applications are built day by day. Currently mobile applications are playing major role in many areas such as banking, social networking, financial apps, entertainment and many more. With this increasing number of applications, security is an important issue. The growth of android market has increased security risk and thus focus should be given to the security. Security is the biggest issue in the field of mobile technology. Therefore, mobile applications need to be assessed and ensure that secure
APA, Harvard, Vancouver, ISO, and other styles
44

Abozeid, Amr, AbdAllah Adel AlHabshy, and Kamal ElDahshan. "A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 11 (2021): 148. http://dx.doi.org/10.3991/ijim.v15i11.20133.

Full text
Abstract:
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected against any security threat such as unauthorized distribution or code retrieval. Due to the lack of applying a software security standard architecture, developers may create software that may be vulnerable to many types of security threats. This paper begins by reviewing different types of known software security threats and their countermeasu
APA, Harvard, Vancouver, ISO, and other styles
45

Горелик, В. Ю., and Д. С. Скоморохов. "Networked web application security." Informacionno-technologicheskij vestnik, no. 1(23) (March 11, 2020): 104–9. http://dx.doi.org/10.21499/2409-1650-2020-23-1-104-109.

Full text
Abstract:
В статье рассматриваются вопросы обеспечения защиты веб-приложений от сетевых угроз. Проведен анализ методов обеспечения сетевой безопасности и безопасности веб-приложений, рассмотрены особенности их осуществления и реализации. Описан процесс комбинирования указанных средств при проектировании и реализации системы защиты для обеспечения безопасности информационной среды предприятий и используемых веб-приложений. This article discusses the issues of protecting web applications from network threats. The analysis of methods for ensuring network security and web application security is carried out
APA, Harvard, Vancouver, ISO, and other styles
46

Kuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Full text
Abstract:
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications
APA, Harvard, Vancouver, ISO, and other styles
47

Abhijit J, Patil, and Dr G. Syam Prasad. "Trust Based Security Model for IoT and Fog based Applications." International Journal of Engineering & Technology 7, no. 2.7 (2018): 691. http://dx.doi.org/10.14419/ijet.v7i2.7.10924.

Full text
Abstract:
Wireless sensor networks (WSN’s) are becoming increasingly popular in the current Era. WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation. IOT is a very growing area and having wide scope for research. Integration of WSNs into IoT is today’s need. Adoptions to cloud computing, increasing use of automation of tools, Integration of internet into most activities of human had reached to the stage where Internet of Things based applications are becoming more
APA, Harvard, Vancouver, ISO, and other styles
48

Yao, Jing Jing. "A New Kind of Security Communication Mechanism with Security Sessions." Applied Mechanics and Materials 513-517 (February 2014): 2506–9. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2506.

Full text
Abstract:
For the smart card, the existing security system does not establish a secure communication with the terminal application, which makes the possibility of being attacked by intercepted, modified or forged orders. In this paper, the definition of security session is given. Through a combination of the original concept of security state and security attributes, security session can set up secure communication channel between the smart card and the applications on terminals, which form a new smart card security communication mechanism.
APA, Harvard, Vancouver, ISO, and other styles
49

Nagaratnam, N., A. Nadalin, M. Hondo, M. McIntosh, and P. Austel. "Business-driven application security: From modeling to managing secure applications." IBM Systems Journal 44, no. 4 (2005): 847–67. http://dx.doi.org/10.1147/sj.444.0847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Fan, Yi Xing, and Ren Bing Zhang. "Research on Network Security and Identity Authentication." Advanced Materials Research 926-930 (May 2014): 2046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2046.

Full text
Abstract:
With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, authentication technology plays a very important role for network application security. Through the study of reason perish analysis and system design, providing efficient and practical solutions for network security applications system. The purpose of this paper is to research on authentication mechanisms and authentication protocols, analysis characteristics and application environ
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!