To see the other types of publications on this topic, follow the link: Security architecture.

Journal articles on the topic 'Security architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Et al., Sarayut Chaisuriya. "A Ring-Based Cybersecurity Architecture for Critical Infrastructure." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2826–40. http://dx.doi.org/10.17762/turcomat.v12i6.5790.

Full text
Abstract:
A defense-in-depth (DID) approach for securing critical information infrastructure has been a common method used in cybersecurity. However, holistic design guidelines are lacking which precludes organizations from adopting them. Therefore, this paper sets out to outline and detail a holistic framework using ring-based nested network zone architecture for the design and implementation of highly secured networked environments. The proposed cybersecurity architecture framework offers a structural design for holistically designed N-tier system architectures. Several implementation options, including zoning perimeters, are suggested as being capable of offering different security capability levels by trading off amongst various security aspects. Also, the proposed architecture allows adaptability in implementations for various real-world networks. This paper also proposes an attack-hops verification approach to evaluate the architectural design.
APA, Harvard, Vancouver, ISO, and other styles
2

Shapiro, Michael J. "Architecture as event space: Violence, securitisation, and resistance." European Journal of International Security 4, no. 3 (July 26, 2019): 366–85. http://dx.doi.org/10.1017/eis.2019.13.

Full text
Abstract:
AbstractCentral to the conception of this article is the architectural theorist Bernard Tschumi's dictum, ‘There is no architecture without action, no architecture without events, no architecture without program … no architecture without violence.’ Shaped as well by Eyal Weizman's conception of ‘forensic architecture’, the focus of the investigation is on Israel's architecture of security and on the corresponding Palestinian architecture of resistance. Emphasising an encounter of cartographies that reveals the way Palestinians make life livable in response to the architectural violence they face, the analysis continues with reference to Yari Sharif's analysis of architectures of resistance and with a reading of a feature film, Hany Abu-Assad's Omar (2013) in which the Separation Wall between Israel and Palestine is one of the film's primary agent/protagonists. The article surveys popular culture texts, focused on crime and espionage to analyse a range of security practices and breaches that amplify the analysis with attention to security issues in individual households, multiple-person dwelling arrangements, architectural locations throughout cities, and buildings housing governmental security agencies. That trajectory of architectural sites lends a micropolitical analysis to the macropolitical level of governmental policy and modes of resistance to it.
APA, Harvard, Vancouver, ISO, and other styles
3

Alnaim, Abdulrahman Khalid, Ahmed Mahmoud Alwakeel, and Eduardo B. Fernandez. "Towards a Security Reference Architecture for NFV." Sensors 22, no. 10 (May 14, 2022): 3750. http://dx.doi.org/10.3390/s22103750.

Full text
Abstract:
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures.
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.

Full text
Abstract:
Internet benefits societies by constantly connecting devices and transmitting data across the world. However, due to the lack of architectural built-in security, the pervasive network attacks faced by the entire information technology are considered to be unending and inevitable. As Internet evolves, security issues are regularly fixed according to a patch-like strategy. Nevertheless, the patch-like strategy generally results in arms races and passive situations, leaving an endless lag in both existing and emerging attacking surface. In this paper, we present NAIS (Network Architecture with Intrinsic Security)—a network architecture towards trustworthiness and security. By solving stubborn security issues like IP spoofing, MITM (man-in-the-middle) attacks, and DDoS (distributed denial of service) attacks at architectural level, NAIS is envisioned to provide the most secure end-to-end communication in the network layer. This paper first presents a comprehensive analysis of network security at Internet range. Then, the system design of NAIS is elaborated with particular design philosophies and four security techniques. Such philosophies and techniques intertwine internally and contribute to a communication environment with authenticity, privacy, accountability, confidentiality, integrity, and availability. Finally, we evaluate the security functionalities on the packet forwarding performance, demonstrating that NAIS can efficiently provide security and trustworthiness in Internet end-to-end communication.
APA, Harvard, Vancouver, ISO, and other styles
5

Murray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (January 1998): 43–54. http://dx.doi.org/10.1080/10658989809342548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (December 1, 1998): 1–12. http://dx.doi.org/10.1201/1086/43299.6.4.19980101/30998.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Murphy, Bruce, Steve Schlarman, and Rik Boren. "Enterprise Security Architecture." Information Systems Security 9, no. 2 (May 2000): 1–14. http://dx.doi.org/10.1201/1086/43309.9.2.20000506/31351.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Molva, Refik. "Internet security architecture." Computer Networks 31, no. 8 (April 1999): 787–804. http://dx.doi.org/10.1016/s1389-1286(98)00016-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim, and M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 31, 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.

Full text
Abstract:
The roll out of the deployment of the 5G technology has been ongoing globally. The deployment of the technologies associated with 5G has seen mixed reaction as regards its prospects to improve communication services in all spares of life amid its security concerns. The security concerns of 5G network lies in its architecture and other technologies that optimize the performance of its architecture. There are many fractions of 5G security architecture in the literature, a holistic security architectural structure will go a long way in tackling the security challenges. In this paper, the review of the security challenges of the 5G technology based on its architecture is presented along with their proposed solutions. This review was carried out with some keywords relating to 5G securities and architecture; this was used to retrieve appropriate literature for fitness of purpose. The 5G security architectures are majorly centered around the seven network security layers; thereby making each of the layers a source of security concern on the 5G network. Many of the 5G security challenges are related to authentication and authorization such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio access technology, smart-grid network and light fidelity. The implementation of these solutions should be reviewed on a timely basis because of the dynamic nature of threats which will greatly reduce the occurrence of security attacks on the 5G network.
APA, Harvard, Vancouver, ISO, and other styles
11

Trinath Basu, M., and Dr JKR Sastry. "A fully security included Cloud Computing Architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 807. http://dx.doi.org/10.14419/ijet.v7i2.7.10984.

Full text
Abstract:
Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is undertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system. In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
12

Han, So-Ra, and Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Alshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Full text
Abstract:
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is the most important architecture because it is responsible for defining how all types of data, whether security-critical or not, are stored and accessed. This paper focuses on addressing the lack of a complete solution to help enterprise system architects to address the security of their organizations from early stages. The novelty of this approach is that it specifies how to modify the required artifacts by the enterprise database architecture to address security-critical data. The approach also defines a number of security measurements that help enterprise architects in measuring the security of the organization database based on those artifacts. These metrics are developed based on the results of a cybersecurity experiment conducted on 100 randomly selected open-source websites. The paper's contributions also consist of the definition of a number of security refactoring rules that specify how to modify current enterprise databases to make them more secure. This paper uses an existing relational diagram for a health clinic database to illustrate the application of the model to an existing database. The validity and applicability of these metrics and refactoring rules are proved using an experiment conducted on a number of security-related databases.
APA, Harvard, Vancouver, ISO, and other styles
14

Musthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.

Full text
Abstract:
In this work we present novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the cluster heads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network. We also proposing a special security routing architecture called Local Intrusion Detection (LID) to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased.
APA, Harvard, Vancouver, ISO, and other styles
15

Aldea, Constantin Lucian, Razvan Bocu, and Anca Vasilescu. "Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks." Sensors 23, no. 1 (December 24, 2022): 189. http://dx.doi.org/10.3390/s23010189.

Full text
Abstract:
The design and implementation of secure IoT platforms and software solutions represent both a required functional feature and a performance acceptance factor nowadays. This paper describes relevant cybersecurity problems considered during the proposed microservices architecture development. Service composition mechanisms and their security are affected by the underlying hardware components and networks. The overall speedup of the platforms, which are implemented using the new 5G networks, and the capabilities of new performant IoT devices may be wasted by an inadequate combination of authentication services and security mechanisms, by the architectural misplacing of the encryption services, or by the inappropriate subsystems scaling. Considering the emerging microservices platforms, the Spring Boot alternative is used to implement data generation services, IoT sensor reading services, IoT actuators control services, and authentication services, and ultimately assemble them into a secure microservices architecture. Furthermore, considering the designed architecture, relevant security aspects related to the medical and energy domains are analyzed and discussed. Based on the proposed architectural concept, it is shown that well-designed and orchestrated architectures that consider the proper security aspects and their functional influence can lead to stable and secure implementations of the end user’s software platforms.
APA, Harvard, Vancouver, ISO, and other styles
16

K.Sai Manoj, Dr, Ms K.Mrudula, G. Maanasa, and K. Phani Srinivas. "Conceptual oriented study on the cloud computing architecture for the full-security." International Journal of Engineering & Technology 7, no. 4 (September 24, 2018): 2491. http://dx.doi.org/10.14419/ijet.v7i4.11654.

Full text
Abstract:
Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is un-dertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system.In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
17

S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (June 2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Marelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (March 11, 2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Derdour, Makhlouf, Adel Alti, Mohamed Gasmi, and Philippe Roose. "Security architecture metamodel for Model Driven security." Journal of Innovation in Digital Ecosystems 2, no. 1-2 (December 2015): 55–70. http://dx.doi.org/10.1016/j.jides.2015.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hilaluddin, Kholilah, and Mohd Zhafri Mohd Zukhi. "Security Architecture for MANETs." International Innovative Research Journal of Engineering and Technology 5, no. 2 (December 30, 2019): 44–50. http://dx.doi.org/10.32595/iirjet.org/v5i2.2019.103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Emmers, Ralf. "Asia's Evolving Security Architecture." Asia Policy 27, no. 1 (2020): 128–30. http://dx.doi.org/10.1353/asp.2020.0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Gong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hayday, John. "Windows NT security architecture." Information Security Technical Report 3, no. 3 (January 1998): 15–22. http://dx.doi.org/10.1016/s1363-4127(98)80027-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hayday, John. "Windows NT security architecture." Information Security Technical Report 4 (January 1999): 17–18. http://dx.doi.org/10.1016/s1363-4127(99)80038-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gluck, Fredric B. "The Open Security Architecture." Information Management & Computer Security 1, no. 3 (March 1993): 4–11. http://dx.doi.org/10.1108/eum0000000001704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Muftic, Sead. "Extended OSI security architecture." Computer Networks and ISDN Systems 17, no. 3 (September 1989): 223–27. http://dx.doi.org/10.1016/0169-7552(89)90085-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Blumenthal, Uri, Michael Marcovici, Semyon Mizikovsky, Sarvar Patel, Ganapathy S. Sundaram, and Marcus Wong. "Wireless network security architecture." Bell Labs Technical Journal 7, no. 2 (December 2, 2002): 19–36. http://dx.doi.org/10.1002/bltj.10003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

R, Jithin, and Priya Chandran. "Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices." Future Internet 10, no. 12 (November 30, 2018): 119. http://dx.doi.org/10.3390/fi10120119.

Full text
Abstract:
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, the automobile industry, and beyond. The introduction of internet connectivity in objects that are frequently used in daily life raises the question of security—how secure is the information and the infrastructure handled by these devices when they are connected to the internet? Security enhancements through standard cryptographic techniques are not suitable due to the power and performance constraints of IoT devices. The introduction of virtualization technology into IoT devices is a recent development, meant for fulfilling security and performance needs. However, virtualization augments the vulnerability present in IoT devices, due to the addition of one more software layer—namely, the hypervisor, which enables the sharing of resources among different users. This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation—a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embedded virtualization architectures for IoT devices. The article illustrates the performance enhancement achieved by the proposed architecture with the existing architectures.
APA, Harvard, Vancouver, ISO, and other styles
30

Yeşiltepe, Mirsat, and Ömer Özgür Bozkurt. "Security Type Comparison in Service Oriented Architecture Security." Procedia - Social and Behavioral Sciences 195 (July 2015): 1833–39. http://dx.doi.org/10.1016/j.sbspro.2015.06.402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Patel, Kajal, and Mihir Mehta. "An Outlook Architecture." International Journal of Software Innovation 11, no. 1 (January 6, 2023): 1–20. http://dx.doi.org/10.4018/ijsi.315744.

Full text
Abstract:
The internet of things (IoT) has recently received much attention due to its revolutionary potential. The internet of things facilitates data interchange in a large number of possible applications, including smart transportation, smart health, smart buildings, and so on. As a result, these application domains can be grouped to form smart life. In response to the IoT's rapid growth, cybercriminals and security professionals are racing to keep up. Billions of connected devices can exchange sensitive information with each other. As a result, securing IoT and protecting users' privacy is a huge concern. A session for communication in a network is established by authenticating and validating the device's identity and checking whether it is a legal device. The IoT technology can be used for various applications only if challenges related to IoT security can be overcome.
APA, Harvard, Vancouver, ISO, and other styles
32

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
33

Semenov, N. A., and A. A. Poltavtsev. "Cloud-Based Data Architecture Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 1056–64. http://dx.doi.org/10.3103/s0146411619080285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tominaga, Hideyoshi. "Trends of security network architecture." IEEJ Transactions on Industry Applications 110, no. 9 (1990): 941–43. http://dx.doi.org/10.1541/ieejias.110.941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (December 2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mirhakkak, Mohammad. "A distributed system security architecture." ACM SIGCOMM Computer Communication Review 23, no. 5 (October 1993): 6–16. http://dx.doi.org/10.1145/165611.165613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Olivier, Martin S. "Towards a configurable security architecture." Data & Knowledge Engineering 38, no. 2 (August 2001): 121–45. http://dx.doi.org/10.1016/s0169-023x(01)00019-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shirey, Robert W. "Defense data network security architecture." ACM SIGCOMM Computer Communication Review 20, no. 2 (April 1990): 66–72. http://dx.doi.org/10.1145/378570.378710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

TOW, WILLIAM T., and BRENDAN TAYLOR. "What is Asian security architecture?" Review of International Studies 36, no. 1 (January 2010): 95–116. http://dx.doi.org/10.1017/s0260210509990520.

Full text
Abstract:
Abstract‘Architecture’ has emerged as the new catchphrase in Asian security politics. Despite its growing centrality, insufficient attention has thus far been given to defining the term, often leading to its imprecise usage. This article seeks to redress that shortcoming. It reviews the ways in which various scholars and practitioners have employed the term ‘security architecture’ and highlights the anomalies that their often differing employment has created. The article proposes a set of guidelines to aid conceptualisation and application of the term. In so doing it establishes criteria to ascertain what ‘security architecture’ actually exists in the Asian region, and must ultimately exist to assure regional security.
APA, Harvard, Vancouver, ISO, and other styles
40

Muftic, Sead, and Morris Sloman. "Security architecture for distributed systems." Computer Communications 17, no. 7 (July 1994): 492–500. http://dx.doi.org/10.1016/0140-3664(94)90104-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hunter, Philip. "Network security architecture without perimeters." Network Security 2002, no. 12 (December 2002): 1–2. http://dx.doi.org/10.1016/s1353-4858(02)12001-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Al-Hawamde, Al-Muthanna, Adil Khan, and M. Sikander Hayat Khiyal. "IPSec Based Bluetooth Security Architecture." Information Technology Journal 6, no. 4 (May 1, 2007): 478–89. http://dx.doi.org/10.3923/itj.2007.478.489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Kaisheng. "Future Security Architecture in Asia." China Quarterly of International Strategic Studies 01, no. 04 (December 2015): 553–72. http://dx.doi.org/10.1142/s2377740015500256.

Full text
Abstract:
The current security architecture in Asia is facing serious challenges including more offensive alliances and less defensive collective security mechanisms, the co-existence of redundancy and deficit of security regimes, and the absence of effective management of Sino-American structural contradictions. Given the diversification and complexity of these security challenges, the priority on the Asian security agenda should be to pursue effective coordination among various security regimes, rather than try to build an integrated architecture. This article argues that a new security framework can be created from three levels of security regimes. On the first level, forums led by smaller Asian countries with participation from China and the U.S. can boost more dialogues and mutual trust. On the second level, regional regimes can deal with regional security issues by harmonizing regional powers with the collective security mechanism. On the third level, Sino-American security regimes can help manage the conflicts between two great powers. Ultimately, the concert of regimes depends on the benign and effective interactions between China and the United States.
APA, Harvard, Vancouver, ISO, and other styles
44

Wiersma, Jan Marinus. "European Security Architecture at Risk?" Security and Human Rights 25, no. 3 (December 31, 2014): 345–54. http://dx.doi.org/10.1163/18750230-02503009.

Full text
Abstract:
The forty-year anniversary of the Helsinki Agreements on which the existing formal security arrangements of Europe are based, could have led to a convivial party. In reality the opposite is actually the case. The European safety relations in 2015 look now on course for another long-lasting conflict between East and West. There is little time to celebrate .1
APA, Harvard, Vancouver, ISO, and other styles
45

de Haas, Marcel. "Medvedev's alternative European security architecture." Security and Human Rights 21, no. 1 (2010): 45–48. http://dx.doi.org/10.1163/187502310791306070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Burkett, Jason S. "Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®." Information Security Journal: A Global Perspective 21, no. 1 (January 2012): 47–54. http://dx.doi.org/10.1080/19393555.2011.629341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Singh, Amit Kumar, and Geeta Chhabra Gandhi. "Computer Architecture." International Journal of Smart Security Technologies 7, no. 1 (January 2020): 41–48. http://dx.doi.org/10.4018/ijsst.2020010103.

Full text
Abstract:
It is a well-known fact that the expansion of Internet has given rise to many daily activities which are being done online including financial and personal data transactions which has developed the need of security like never before. It has made people realize that the data on the internet must be secured as many types of attacks are increasing day by day with the advancement of technology. So, here the requirement is to ensure that the services are supplied to a legitimate user rather than bots to prevent service abuse. The present article provides such a security from bots with the help of a standard security mechanism called CAPTCHA. A new cognition-based design of CAPTCHA is produced overcoming the limitation of presently available CAPTCHA. Also, a new architecture for producing these CAPTCHA codes randomly is presented in this article so that the differentiation among a legitimate user and Bots can be made. Thus, the major objective of the article is to present an optimum security mechanism for differentiating among humans and Bots.
APA, Harvard, Vancouver, ISO, and other styles
48

Pelc, Mariusz, and Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 05 (June 2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.

Full text
Abstract:
Nowadays, information/data security and availability are of utmost importance. However, due to the fact that security is a process rather than a state, there is an increasing demand for technologies or architectural solutions that would allow a computer system to adjust its level of security in response to changes in its environmental/network characteristics. In this paper, an architecture for a self-managing adaptive router/firewall has been proposed to facilitate an intelligent and real-time self-protection of a computer system. We also show how the proposed architecture might be used to control other system mechanisms or resources (for example, RAM).
APA, Harvard, Vancouver, ISO, and other styles
49

Preschern, Christopher, Nermin Kajtazovic, Andrea Höller, and Christian Kreiner. "Quantitative Security Estimation Based on Safety Architecture Design Patterns." Lecture Notes on Software Engineering 2, no. 4 (2014): 307–13. http://dx.doi.org/10.7763/lnse.2014.v2.141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (June 12, 2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Full text
Abstract:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography