Academic literature on the topic 'Security architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security architecture"

1

Et al., Sarayut Chaisuriya. "A Ring-Based Cybersecurity Architecture for Critical Infrastructure." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2826–40. http://dx.doi.org/10.17762/turcomat.v12i6.5790.

Full text
Abstract:
A defense-in-depth (DID) approach for securing critical information infrastructure has been a common method used in cybersecurity. However, holistic design guidelines are lacking which precludes organizations from adopting them. Therefore, this paper sets out to outline and detail a holistic framework using ring-based nested network zone architecture for the design and implementation of highly secured networked environments. The proposed cybersecurity architecture framework offers a structural design for holistically designed N-tier system architectures. Several implementation options, including zoning perimeters, are suggested as being capable of offering different security capability levels by trading off amongst various security aspects. Also, the proposed architecture allows adaptability in implementations for various real-world networks. This paper also proposes an attack-hops verification approach to evaluate the architectural design.
APA, Harvard, Vancouver, ISO, and other styles
2

Shapiro, Michael J. "Architecture as event space: Violence, securitisation, and resistance." European Journal of International Security 4, no. 3 (July 26, 2019): 366–85. http://dx.doi.org/10.1017/eis.2019.13.

Full text
Abstract:
AbstractCentral to the conception of this article is the architectural theorist Bernard Tschumi's dictum, ‘There is no architecture without action, no architecture without events, no architecture without program … no architecture without violence.’ Shaped as well by Eyal Weizman's conception of ‘forensic architecture’, the focus of the investigation is on Israel's architecture of security and on the corresponding Palestinian architecture of resistance. Emphasising an encounter of cartographies that reveals the way Palestinians make life livable in response to the architectural violence they face, the analysis continues with reference to Yari Sharif's analysis of architectures of resistance and with a reading of a feature film, Hany Abu-Assad's Omar (2013) in which the Separation Wall between Israel and Palestine is one of the film's primary agent/protagonists. The article surveys popular culture texts, focused on crime and espionage to analyse a range of security practices and breaches that amplify the analysis with attention to security issues in individual households, multiple-person dwelling arrangements, architectural locations throughout cities, and buildings housing governmental security agencies. That trajectory of architectural sites lends a micropolitical analysis to the macropolitical level of governmental policy and modes of resistance to it.
APA, Harvard, Vancouver, ISO, and other styles
3

Alnaim, Abdulrahman Khalid, Ahmed Mahmoud Alwakeel, and Eduardo B. Fernandez. "Towards a Security Reference Architecture for NFV." Sensors 22, no. 10 (May 14, 2022): 3750. http://dx.doi.org/10.3390/s22103750.

Full text
Abstract:
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures.
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.

Full text
Abstract:
Internet benefits societies by constantly connecting devices and transmitting data across the world. However, due to the lack of architectural built-in security, the pervasive network attacks faced by the entire information technology are considered to be unending and inevitable. As Internet evolves, security issues are regularly fixed according to a patch-like strategy. Nevertheless, the patch-like strategy generally results in arms races and passive situations, leaving an endless lag in both existing and emerging attacking surface. In this paper, we present NAIS (Network Architecture with Intrinsic Security)—a network architecture towards trustworthiness and security. By solving stubborn security issues like IP spoofing, MITM (man-in-the-middle) attacks, and DDoS (distributed denial of service) attacks at architectural level, NAIS is envisioned to provide the most secure end-to-end communication in the network layer. This paper first presents a comprehensive analysis of network security at Internet range. Then, the system design of NAIS is elaborated with particular design philosophies and four security techniques. Such philosophies and techniques intertwine internally and contribute to a communication environment with authenticity, privacy, accountability, confidentiality, integrity, and availability. Finally, we evaluate the security functionalities on the packet forwarding performance, demonstrating that NAIS can efficiently provide security and trustworthiness in Internet end-to-end communication.
APA, Harvard, Vancouver, ISO, and other styles
5

Murray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (January 1998): 43–54. http://dx.doi.org/10.1080/10658989809342548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (December 1, 1998): 1–12. http://dx.doi.org/10.1201/1086/43299.6.4.19980101/30998.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Murphy, Bruce, Steve Schlarman, and Rik Boren. "Enterprise Security Architecture." Information Systems Security 9, no. 2 (May 2000): 1–14. http://dx.doi.org/10.1201/1086/43309.9.2.20000506/31351.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Molva, Refik. "Internet security architecture." Computer Networks 31, no. 8 (April 1999): 787–804. http://dx.doi.org/10.1016/s1389-1286(98)00016-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim, and M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 31, 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.

Full text
Abstract:
The roll out of the deployment of the 5G technology has been ongoing globally. The deployment of the technologies associated with 5G has seen mixed reaction as regards its prospects to improve communication services in all spares of life amid its security concerns. The security concerns of 5G network lies in its architecture and other technologies that optimize the performance of its architecture. There are many fractions of 5G security architecture in the literature, a holistic security architectural structure will go a long way in tackling the security challenges. In this paper, the review of the security challenges of the 5G technology based on its architecture is presented along with their proposed solutions. This review was carried out with some keywords relating to 5G securities and architecture; this was used to retrieve appropriate literature for fitness of purpose. The 5G security architectures are majorly centered around the seven network security layers; thereby making each of the layers a source of security concern on the 5G network. Many of the 5G security challenges are related to authentication and authorization such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio access technology, smart-grid network and light fidelity. The implementation of these solutions should be reviewed on a timely basis because of the dynamic nature of threats which will greatly reduce the occurrence of security attacks on the 5G network.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security architecture"

1

Al-Azzani, Sarah. "Architecture-centric testing for security." Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5206/.

Full text
Abstract:
This thesis presents a novel architecture-centric approach, which uses Implied Scenarios (IS) to detect design-vulnerabilities in the software architecture. It reviews security testing approaches, and draws on their limitations in addressing unpredictable behaviour in the face of evolution. The thesis introduces the concept of Security ISs as unanticipated (possibly malicious) behaviours that indicate potential insecurities in the architecture. The IS approach uses the architecture as the appropriate level of abstraction to tackle the complexity of testing. It provides potential for scalability to test large scale complex applications. It proposes a three-phased method for security testing: (1) Detecting design-level vulnerabilities in the architecture in an incremental manner by composing functionalities as they evolve. (2) Classifying the impact of detected ISs on the security of the architecture. (3) Using the detected ISs and their impact to guide the refinement of the architecture. The refinement is test-driven and incremental, where refinements are tested before they are committed. The thesis also presents SecArch, an extension to the IS approach to enhance its search-space to detect hidden race conditions. The thesis reports on the applications of the proposed approach and its extension to three case studies for testing the security of distributed and cloud architectures in the presence of uncertainty in the operating environment, unpredictability of interaction and possible security IS.
APA, Harvard, Vancouver, ISO, and other styles
2

Moten, Daryl, and Sekaran Jambureskan. "Security Architecture for Telemetry Networks." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/578363.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA
This paper develops a Security Architecture for a network of telemetry networks as is envisioned for future telemetry systems. We show a model for an aggregation of Test Centers as might be deployed for the envisioned network telemetry. We build a security architecture grounded in best practices for security design as captured in the NIST family of standards and guidelines captured in the SANS 20 critical controls.
APA, Harvard, Vancouver, ISO, and other styles
3

Dukes, Renata. "Proposed iNET Network Security Architecture." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605971.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada
Morgan State University's iNET effort is aimed at improving existing telemetry networks by developing more efficient operation and cost effectiveness. This paper develops an enhanced security architecture for the iNET environment in order to protect the network from both inside and outside adversaries. This proposed architecture addresses the key security components of confidentiality, integrity and authentication. The security design for iNET is complicated by the unique features of the telemetry application. The addition of encryption is complicated by the need for robust synchronization needed for real time operation in a high error environment.
APA, Harvard, Vancouver, ISO, and other styles
4

Andersson, Martin. "Software Security Testing : A Flexible Architecture for Security Testing." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2388.

Full text
Abstract:

Abstract: This thesis begins with briefly describing a few vulnerability classes that exist in today’s software. We then continue by describing how these vulnerabilities could be discovered through dynamic testing. Both general testing techniques and existent tools are mentioned.

The second half of this thesis present and evaluates a new flexible architecture. This new architecture has the ability to combine different approaches and create a more flexible environment from where the testing can be conducted. This new flexible architecture aims towards reducing maintenance and/or adaptation time for existing tools or frameworks. The architecture consists of a given set of plug-ins that can be easily replaced to adapt test as needed. We evaluate this architecture by implementing test plug-ins. We also use this architecture and a set of test plug-ins to generate a fuzzer targeted to test a known vulnerable server.

APA, Harvard, Vancouver, ISO, and other styles
5

Rodem, Magne. "Security in a Service-Oriented Architecture." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9719.

Full text
Abstract:

In a service-oriented architecture (SOA), parts of software applications are made available as services. These services can be combined across multiple applications, technologies, and organizations. As a result, functionality can be more easily reused, and new business processes can be assembled at a low cost. However, as more functionality is exposed outside of the traditional boundaries of applications, new approaches to security are needed. While SOA shares many of the security threats of traditional systems, the countermeasures to some of these threats may differ. Most notably, eavesdropping, data tampering, and replay attacks must be countered on the message level in a complex SOA environment. In addition, the open and distributed nature of SOA leads to new ways of handling authentication, authorization, logging, and monitoring. Web Services are the most popular way of realizing SOA in practice, and make use of a set of standards such as WS-Security, XML Encryption, XML Signature, and SAML for handling these new security approaches. Guidelines exist for development of secure software systems, and provide recommendations for things to do or to avoid. In this thesis, I use my findings with regard to security challenges, threats, and countermeasures to create a set of security guidelines that should be applied during requirements engineering and design of a SOA. Practical use of these guidelines is demonstrated by applying them during development of a SOA-based system. This system imports personal data into multiple administrative systems managed by UNINETT FAS, and is designed using Web Services and XML-based security standards. Through this practical demonstration, I show that my guidelines can be used as a reference for making appropriate security decisions during development of a SOA.

APA, Harvard, Vancouver, ISO, and other styles
6

Artz, Michael Lyle 1979. "NetSPA : a Network Security Planning Architecture." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29899.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (leaves 93-96).
Attack scenario graphs provide a concise way of displaying all possible sequences of attacks a malicious user can execute to obtain a desired goal, such as remotely achieving root undetected on a critical host machine. NETSPA, the Network Security Planning Architecture, is a C++ system that quickly generates worst-case attack graphs using a forward-chaining depth-first search of the possible attack space using actions modeled with REM, a simple attack description language. NETSPA accepts network configuration information from a database that includes host and network software types and versions, intrusion detection system placement and types, network connectivity, and firewall rulesets. It is controlled by command line inputs that determine a critical goal state, trust relationships between hosts, and maximum recursive depth. NETSPA was shown to efficiently provide easily understood attack graphs that revealed non-obvious security problems against a realistic sample network of 17 representative hosts using 23 REM defined actions. The largest useful graph was generated within 1.5 minutes of execution. NETSPA-executes faster and handles larger networks than any existing graph generation system. This allows NETSPA to be practically used in combination with other security components to develop and analyze secure networks.
by Michael Lyle Artz.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Brown-Moorer, Charlotte A. "Traceable Enterprise Information Security Architecture Methodology." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/605972.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada
With the introduction of networking into telemetry applications, these systems have become increasingly complex. This imposes significant strain on information security for architecture designs. It has been recognized that an organized or structured approach to developing security architectures is needed. Several enterprise architecture frameworks are available today that address system complexity. However they fall short of addressing security at a high enough level in the enterprise and address security too late in the design process. In this paper a methodology is proposed that bridges the gap between security requirements and architecture design development at the enterprise level. This approach is consistent with and traceable to the original needs of the customer. This paper introduces a systems engineering approach to develop an enterprise level methodology, and presents a worked example of this approach for the integrated Network Enhanced Telemetry system.
APA, Harvard, Vancouver, ISO, and other styles
8

Bozios, Athanasios. "Fog Computing : Architecture and Security aspects." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80178.

Full text
Abstract:
As the number of Internet of Things (IoT) devices that are used daily is increasing, the inadequacy of cloud computing to provide neseccary IoT-related features, such as low latency, geographic distribution and location awareness, is becoming more evident. Fog computing is introduced as a new computing paradigm, in order to solve this problem by extending the cloud‟s storage and computing resources to the network edge. However, the introduction of this new paradigm is also confronted by various security threats and challenges since the security practices that are implemented in cloud computing cannot be applied directly to this new architecture paradigm. To this end, various papers have been published in the context of fog computing security, in an effort to establish the best security practices towards the standardization of fog computing. In this thesis, we perform a systematic literature review of current research in order to provide with a classification of the various security threats and challenges in fog computing. Furthermore, we present the solutions that have been proposed so far and which security challenge do they address. Finally, we attempt to distinguish common aspects between the various proposals, evaluate current research on the subject and suggest directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.

Full text
Abstract:
The prevalence of the Internet, client/server applications, Java, e-commerce, and electronic communications offers tremendous opportunities for business, education and communication, while simultaneously presenting big challenges to network security. In general, the web was designed with little concern for security. Thus, the issue of security is important in the design of network-based applications. The software architecture proposed in this thesis allows for the secure and efficient running of a team-based decision support system, specifically TEAMDEC. Based on the system's requirements and architecture, three types of possible attacks to the system are identified and a security solution is proposed that allows for user authentication, secure communication, and script access control. The implementation of these features will reduce security risk and allow effective use of the valuable system information data.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, He. "High Performance Computing Architecture with Security." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/578611.

Full text
Abstract:
Multi-processor embedded system is the future promise of high performance computing architecture. However, it still suffers low network efficiency and security threat. Simply upgrading to multi-core systems has been proven to provide only minor speedup compared with single core systems. Router architecture of network-on-chip (NoC) uses shared input buffers such as virtual channels and crossbar switches that only allow sequential data access. The speed and efficiency of on-chip communication is limited. In addition, the performance of conventional NoC topology is limited by routing latency and energy consumption due to its network diameter increases with the rising number of nodes. The security concern has also become a serious problem for embedded systems. Even with cryptographic algorithms, embedded systems are still very vulnerable to side channel attacks (SCAs). Among SCA approaches, power analysis is an efficient and powerful attack. Once the encryption location in an instruction sequence is identified, power analysis can be applied to exploit the embedded system. To improve on-chip network parallelism, this dissertation proposes a new router microarchitecture based on a new data structure called virtual collision array. Sequential data requests are partially eliminated in the virtual collision array before entering router pipeline. To facilitate the new router architecture, new workload assignment is applied to increase data request elimination. Through a task flow partitioning algorithm, we minimize sequential data access and then schedule tasks while minimizing the total router delay. For NoC topology, this dissertation presents a new hybrid NoC (HyNoC) architecture. We introduce an adaptive routing scheme to provide reconfigurable on-chip communication with both wired and wireless links. In addition, based on a mathematical model which established on cross-correlation, this dissertation proposes two obfuscation methodologies: Real Instruction Insertion and AES Mimic to prevent SCAs power analysis attack.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security architecture"

1

Huisken, Ron. Architecture of Security. Canberra: ANU Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tudor, Jan Killmeyer. Information security architecture. Boca Raton, FL: Auerbach, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brutschin, Elina. EU Gas Security Architecture. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51150-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Shuangbao Paul, and Robert S. Ledley, eds. Computer Architecture and Security. Singapore: John Wiley & Sons Singapore Pte. Ltd., 2012. http://dx.doi.org/10.1002/9781118168851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Network security architectures. Indianapolis, IN: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Information security architecture: An integrated approach to security organization. Boca Raton, FL: Auerbach, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wireless Internet security: Architecture and protocols. New York: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cryptographic security architecture: Design and verification. New York: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security architecture"

1

Ince, A. Nejat, Cem Evrendilek, Dag Wilhelmsen, and Fadıl Gezer. "Security Architecture." In Planning and Architectural Design of Modern Command Control Communications and Information Systems, 213–51. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6159-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DeSoete, Marijke. "Security Architecture." In Encyclopedia of Cryptography and Security, 1144. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mahnke, Wolfgang, and Stefan-Helmut Leitner. "Security." In OPC Unified Architecture, 203–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-68899-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gunasekera, Sheran. "Android Architecture." In Android Apps Security, 1–12. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4063-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Secure Software Architecture." In Software Security, 121–38. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kou, Weidong. "Security Architecture Standard." In Networking Security and Standards, 25–47. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Urueña, Manuel, Petr Machník, Marcin Niemiec, and Nikolai Stoianov. "INDECT Security Architecture." In Communications in Computer and Information Science, 273–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38559-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Jianfeng, Changguang Wang, and Zhuo Ma. "Security Architecture Framework." In Security Access in Wireless Local Area Networks, 29–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00941-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gunasekera, Sheran. "Android Security Architecture." In Android Apps Security, 31–45. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4063-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Chuan-Kun. "IoT Security Architecture." In Internet of Things Security, 27–44. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security architecture"

1

Meng, Dan. "Security-first Architecture." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3267494.3267500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peeters, Eric. "SoC security architecture." In DAC '15: The 52nd Annual Design Automation Conference 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2744769.2747943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moncrief, George, Trent Townsend, and Scotty Swillie. "ezHPC Security Architecture." In 2006 HPCMP Users Group Conference (HPCMP-UGC'06). IEEE, 2006. http://dx.doi.org/10.1109/hpcmp-ugc.2006.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mikhailova, Vasilisa D., Maria G. Shulika, Elena S. Basan, and Olga Yu Peskova. "Security architecture for UAV." In 2021 IEEE Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2021. http://dx.doi.org/10.1109/usbereit51232.2021.9455039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Drozdova, Matilda, Ivana Bridova, Jana Uramova, and Marek Moravcik. "Private cloud security architecture." In 2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2020. http://dx.doi.org/10.1109/iceta51985.2020.9379217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alam, Mahtab, and M. U. Bokhari. "Information Security Policy Architecture." In International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccima.2007.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marshall, William, Alireza Faryar, Kevin Kealy, Gustav Los Reyes, Israel Rosencrantz, Rachel Rosencrantz, and Chaim Spielman. "Carrier VoIP Security Architecture." In Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium. IEEE, 2006. http://dx.doi.org/10.1109/netwks.2006.300384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chbeir, R. "Session details: Security architecture." In CCS06: 13th ACM Conference on Computer and Communications Security 2006. New York, NY, USA: ACM, 2006. http://dx.doi.org/10.1145/3249708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moulton, Christine L., Alan T. Krzywicki, Jared J. Hepp, John Harrell, and Michael Kogut. "Open architecture design and approach for the Integrated Sensor Architecture (ISA)." In SPIE Defense + Security, edited by Raja Suresh. SPIE, 2015. http://dx.doi.org/10.1117/12.2177842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Armstrong, Clay. "Modular mission payload architecture." In Defense and Security, edited by Grant R. Gerhart, Chuck M. Shoemaker, and Douglas W. Gage. SPIE, 2004. http://dx.doi.org/10.1117/12.553031.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security architecture"

1

Rescorla, E. WebRTC Security Architecture. RFC Editor, January 2021. http://dx.doi.org/10.17487/rfc8827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dasgupta, Dipankar. Intelligent Security Console Architecture. Fort Belvoir, VA: Defense Technical Information Center, October 2005. http://dx.doi.org/10.21236/ada440573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Veitch, Cynthia, Jordan Henry, Bryan Richardson, and Derek Hart. Microgrid cyber security reference architecture. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1090210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hardjono, T., and B. Weis. The Multicast Group Security Architecture. RFC Editor, March 2004. http://dx.doi.org/10.17487/rfc3740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Montelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Fort Belvoir, VA: Defense Technical Information Center, April 2012. http://dx.doi.org/10.21236/ada609926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Irvine, Cynthia E., Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, and Mark Gondree. MYSEA: The Monterey Security Architecture. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada518680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Irvine, Cynthia, David Shifflett, Paul Clark, Timothy Levin, and George Dinolt. Monterey Security Enhanced Architecture Project. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada423514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choo, Vic, Carol Muehrcke, and Rob Vienneau. Operational Information Management Security Architecture. Fort Belvoir, VA: Defense Technical Information Center, December 2006. http://dx.doi.org/10.21236/ada462036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stamp, Jason E., Cynthia K. Veitch, Jordan M. Henry, Derek H. Hart, and Bryan Richardson. Microgrid Cyber Security Reference Architecture (V2). Office of Scientific and Technical Information (OSTI), November 2015. http://dx.doi.org/10.2172/1494354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atkinson, R. Security Architecture for the Internet Protocol. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography