Academic literature on the topic 'Security architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security architecture"
Et al., Sarayut Chaisuriya. "A Ring-Based Cybersecurity Architecture for Critical Infrastructure." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2826–40. http://dx.doi.org/10.17762/turcomat.v12i6.5790.
Full textShapiro, Michael J. "Architecture as event space: Violence, securitisation, and resistance." European Journal of International Security 4, no. 3 (July 26, 2019): 366–85. http://dx.doi.org/10.1017/eis.2019.13.
Full textAlnaim, Abdulrahman Khalid, Ahmed Mahmoud Alwakeel, and Eduardo B. Fernandez. "Towards a Security Reference Architecture for NFV." Sensors 22, no. 10 (May 14, 2022): 3750. http://dx.doi.org/10.3390/s22103750.
Full textJiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.
Full textMurray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (January 1998): 43–54. http://dx.doi.org/10.1080/10658989809342548.
Full textMurray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (December 1, 1998): 1–12. http://dx.doi.org/10.1201/1086/43299.6.4.19980101/30998.8.
Full textMurphy, Bruce, Steve Schlarman, and Rik Boren. "Enterprise Security Architecture." Information Systems Security 9, no. 2 (May 2000): 1–14. http://dx.doi.org/10.1201/1086/43309.9.2.20000506/31351.4.
Full textEloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.
Full textMolva, Refik. "Internet security architecture." Computer Networks 31, no. 8 (April 1999): 787–804. http://dx.doi.org/10.1016/s1389-1286(98)00016-4.
Full textShobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim, and M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 31, 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.
Full textDissertations / Theses on the topic "Security architecture"
Al-Azzani, Sarah. "Architecture-centric testing for security." Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5206/.
Full textMoten, Daryl, and Sekaran Jambureskan. "Security Architecture for Telemetry Networks." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/578363.
Full textThis paper develops a Security Architecture for a network of telemetry networks as is envisioned for future telemetry systems. We show a model for an aggregation of Test Centers as might be deployed for the envisioned network telemetry. We build a security architecture grounded in best practices for security design as captured in the NIST family of standards and guidelines captured in the SANS 20 critical controls.
Dukes, Renata. "Proposed iNET Network Security Architecture." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605971.
Full textMorgan State University's iNET effort is aimed at improving existing telemetry networks by developing more efficient operation and cost effectiveness. This paper develops an enhanced security architecture for the iNET environment in order to protect the network from both inside and outside adversaries. This proposed architecture addresses the key security components of confidentiality, integrity and authentication. The security design for iNET is complicated by the unique features of the telemetry application. The addition of encryption is complicated by the need for robust synchronization needed for real time operation in a high error environment.
Andersson, Martin. "Software Security Testing : A Flexible Architecture for Security Testing." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2388.
Full textAbstract: This thesis begins with briefly describing a few vulnerability classes that exist in today’s software. We then continue by describing how these vulnerabilities could be discovered through dynamic testing. Both general testing techniques and existent tools are mentioned.
The second half of this thesis present and evaluates a new flexible architecture. This new architecture has the ability to combine different approaches and create a more flexible environment from where the testing can be conducted. This new flexible architecture aims towards reducing maintenance and/or adaptation time for existing tools or frameworks. The architecture consists of a given set of plug-ins that can be easily replaced to adapt test as needed. We evaluate this architecture by implementing test plug-ins. We also use this architecture and a set of test plug-ins to generate a fuzzer targeted to test a known vulnerable server.
Rodem, Magne. "Security in a Service-Oriented Architecture." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9719.
Full textIn a service-oriented architecture (SOA), parts of software applications are made available as services. These services can be combined across multiple applications, technologies, and organizations. As a result, functionality can be more easily reused, and new business processes can be assembled at a low cost. However, as more functionality is exposed outside of the traditional boundaries of applications, new approaches to security are needed. While SOA shares many of the security threats of traditional systems, the countermeasures to some of these threats may differ. Most notably, eavesdropping, data tampering, and replay attacks must be countered on the message level in a complex SOA environment. In addition, the open and distributed nature of SOA leads to new ways of handling authentication, authorization, logging, and monitoring. Web Services are the most popular way of realizing SOA in practice, and make use of a set of standards such as WS-Security, XML Encryption, XML Signature, and SAML for handling these new security approaches. Guidelines exist for development of secure software systems, and provide recommendations for things to do or to avoid. In this thesis, I use my findings with regard to security challenges, threats, and countermeasures to create a set of security guidelines that should be applied during requirements engineering and design of a SOA. Practical use of these guidelines is demonstrated by applying them during development of a SOA-based system. This system imports personal data into multiple administrative systems managed by UNINETT FAS, and is designed using Web Services and XML-based security standards. Through this practical demonstration, I show that my guidelines can be used as a reference for making appropriate security decisions during development of a SOA.
Artz, Michael Lyle 1979. "NetSPA : a Network Security Planning Architecture." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29899.
Full textIncludes bibliographical references (leaves 93-96).
Attack scenario graphs provide a concise way of displaying all possible sequences of attacks a malicious user can execute to obtain a desired goal, such as remotely achieving root undetected on a critical host machine. NETSPA, the Network Security Planning Architecture, is a C++ system that quickly generates worst-case attack graphs using a forward-chaining depth-first search of the possible attack space using actions modeled with REM, a simple attack description language. NETSPA accepts network configuration information from a database that includes host and network software types and versions, intrusion detection system placement and types, network connectivity, and firewall rulesets. It is controlled by command line inputs that determine a critical goal state, trust relationships between hosts, and maximum recursive depth. NETSPA was shown to efficiently provide easily understood attack graphs that revealed non-obvious security problems against a realistic sample network of 17 representative hosts using 23 REM defined actions. The largest useful graph was generated within 1.5 minutes of execution. NETSPA-executes faster and handles larger networks than any existing graph generation system. This allows NETSPA to be practically used in combination with other security components to develop and analyze secure networks.
by Michael Lyle Artz.
M.Eng.
Brown-Moorer, Charlotte A. "Traceable Enterprise Information Security Architecture Methodology." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605972.
Full textWith the introduction of networking into telemetry applications, these systems have become increasingly complex. This imposes significant strain on information security for architecture designs. It has been recognized that an organized or structured approach to developing security architectures is needed. Several enterprise architecture frameworks are available today that address system complexity. However they fall short of addressing security at a high enough level in the enterprise and address security too late in the design process. In this paper a methodology is proposed that bridges the gap between security requirements and architecture design development at the enterprise level. This approach is consistent with and traceable to the original needs of the customer. This paper introduces a systems engineering approach to develop an enterprise level methodology, and presents a worked example of this approach for the integrated Network Enhanced Telemetry system.
Bozios, Athanasios. "Fog Computing : Architecture and Security aspects." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80178.
Full textWang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.
Full textMaster of Science
Zhou, He. "High Performance Computing Architecture with Security." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/578611.
Full textBooks on the topic "Security architecture"
Tudor, Jan Killmeyer. Information security architecture. Boca Raton, FL: Auerbach, 2000.
Find full textInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Find full textBrutschin, Elina. EU Gas Security Architecture. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51150-8.
Full textWang, Shuangbao Paul, and Robert S. Ledley, eds. Computer Architecture and Security. Singapore: John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118168851.
Full textEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Find full textInformation security architecture: An integrated approach to security organization. Boca Raton, FL: Auerbach, 2001.
Find full textWireless Internet security: Architecture and protocols. New York: Cambridge University Press, 2008.
Find full textCryptographic security architecture: Design and verification. New York: Springer, 2004.
Find full textBook chapters on the topic "Security architecture"
Ince, A. Nejat, Cem Evrendilek, Dag Wilhelmsen, and Fadıl Gezer. "Security Architecture." In Planning and Architectural Design of Modern Command Control Communications and Information Systems, 213–51. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6159-0_7.
Full textDeSoete, Marijke. "Security Architecture." In Encyclopedia of Cryptography and Security, 1144. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_304.
Full textMahnke, Wolfgang, and Stefan-Helmut Leitner. "Security." In OPC Unified Architecture, 203–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-68899-0_7.
Full textGunasekera, Sheran. "Android Architecture." In Android Apps Security, 1–12. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4063-1_1.
Full textKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Secure Software Architecture." In Software Security, 121–38. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-6.
Full textKou, Weidong. "Security Architecture Standard." In Networking Security and Standards, 25–47. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_3.
Full textUrueña, Manuel, Petr Machník, Marcin Niemiec, and Nikolai Stoianov. "INDECT Security Architecture." In Communications in Computer and Information Science, 273–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38559-9_24.
Full textMa, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Architecture Framework." In Security Access in Wireless Local Area Networks, 29–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_2.
Full textGunasekera, Sheran. "Android Security Architecture." In Android Apps Security, 31–45. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4063-1_3.
Full textWu, Chuan-Kun. "IoT Security Architecture." In Internet of Things Security, 27–44. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_3.
Full textConference papers on the topic "Security architecture"
Meng, Dan. "Security-first Architecture." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267494.3267500.
Full textPeeters, Eric. "SoC security architecture." In DAC '15: The 52nd Annual Design Automation Conference 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2744769.2747943.
Full textMoncrief, George, Trent Townsend, and Scotty Swillie. "ezHPC Security Architecture." In 2006 HPCMP Users Group Conference (HPCMP-UGC'06). IEEE, 2006. http://dx.doi.org/10.1109/hpcmp-ugc.2006.25.
Full textMikhailova, Vasilisa D., Maria G. Shulika, Elena S. Basan, and Olga Yu Peskova. "Security architecture for UAV." In 2021 IEEE Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2021. http://dx.doi.org/10.1109/usbereit51232.2021.9455039.
Full textDrozdova, Matilda, Ivana Bridova, Jana Uramova, and Marek Moravcik. "Private cloud security architecture." In 2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2020. http://dx.doi.org/10.1109/iceta51985.2020.9379217.
Full textAlam, Mahtab, and M. U. Bokhari. "Information Security Policy Architecture." In International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccima.2007.275.
Full textMarshall, William, Alireza Faryar, Kevin Kealy, Gustav Los Reyes, Israel Rosencrantz, Rachel Rosencrantz, and Chaim Spielman. "Carrier VoIP Security Architecture." In Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2006. http://dx.doi.org/10.1109/netwks.2006.300384.
Full textChbeir, R. "Session details: Security architecture." In CCS06: 13th ACM Conference on Computer and Communications Security 2006. New York, NY, USA: ACM, 2006. http://dx.doi.org/10.1145/3249708.
Full textMoulton, Christine L., Alan T. Krzywicki, Jared J. Hepp, John Harrell, and Michael Kogut. "Open architecture design and approach for the Integrated Sensor Architecture (ISA)." In SPIE Defense + Security, edited by Raja Suresh. SPIE, 2015. http://dx.doi.org/10.1117/12.2177842.
Full textArmstrong, Clay. "Modular mission payload architecture." In Defense and Security, edited by Grant R. Gerhart, Chuck M. Shoemaker, and Douglas W. Gage. SPIE, 2004. http://dx.doi.org/10.1117/12.553031.
Full textReports on the topic "Security architecture"
Rescorla, E. WebRTC Security Architecture. RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8827.
Full textDasgupta, Dipankar. Intelligent Security Console Architecture. Fort Belvoir, VA: Defense Technical Information Center, October 2005. http://dx.doi.org/10.21236/ada440573.
Full textVeitch, Cynthia, Jordan Henry, Bryan Richardson, and Derek Hart. Microgrid cyber security reference architecture. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1090210.
Full textHardjono, T., and B. Weis. The Multicast Group Security Architecture. RFC Editor, March 2004. http://dx.doi.org/10.17487/rfc3740.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada609926.
Full textIrvine, Cynthia E., Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, and Mark Gondree. MYSEA: The Monterey Security Architecture. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada518680.
Full textIrvine, Cynthia, David Shifflett, Paul Clark, Timothy Levin, and George Dinolt. Monterey Security Enhanced Architecture Project. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada423514.
Full textChoo, Vic, Carol Muehrcke, and Rob Vienneau. Operational Information Management Security Architecture. Fort Belvoir, VA: Defense Technical Information Center, December 2006. http://dx.doi.org/10.21236/ada462036.
Full textStamp, Jason E., Cynthia K. Veitch, Jordan M. Henry, Derek H. Hart, and Bryan Richardson. Microgrid Cyber Security Reference Architecture (V2). Office of Scientific and Technical Information (OSTI), November 2015. http://dx.doi.org/10.2172/1494354.
Full textAtkinson, R. Security Architecture for the Internet Protocol. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1825.
Full text