Literatura científica selecionada sobre o tema "Security solutions"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Security solutions".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Security solutions"

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (August 5, 2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Texto completo da fonte
Resumo:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of various security measures, including encryption, access control, Security Information and Event Management (SIEM) systems, and automated compliance management tools, in enhancing cloud security. The findings highlight best practices and strategies to safeguard cloud environments against evolving cyber threats, ensuring data integrity, confidentiality, and regulatory compliance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Anupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (June 1, 2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo da fonte
Resumo:
A brain computer interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro-encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored password in the system. Even if other person is presented with the same key image it fails to authenticate as the cortical folds of the brain are unique to each human being just like a fingerprint or DNA.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (February 1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ranjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (January 20, 2022): 616–20. https://doi.org/10.5281/zenodo.6345325.

Texto completo da fonte
Resumo:
<strong><em>Abstract: </em></strong>Because the general population becomes increasingly progressively more and a lot of refined in their understanding and use of computers and because the technologies related to computing become more powerful, there&#39;s a robust chance that cybercrimes can become a lot of common. India is rated collectively of the countries with the very best levels of e-crime activities. Despite years of enhancements to the usability of interactive, end user facing security systems aboard a fast and sustained growth of law breaking, several of those security systems stay underutilized. It is, however, turning into more and more necessary that security are some things end users actively utilize and interact with. While a cyber security breach these days may represent loss, embarrassment and therefore the loss of holding, it would tomorrow constitute loss of management over our homes, cars and bodies. One drawback is that whereas the usability of security systems has improved, attitudes regarding the importance of end user security has not the awareness of security threats and out there defenses, the motivation to utilize counseled security tools and behaviors, and therefore the data of the way to use counseled security tools and behaviors stay low. How will we tend to smart and intelligent systems that encourage higher cyber security behaviors?&nbsp; It is a most challenging goal in front of Indian Government.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Golchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (April 27, 2015): 21–24. https://doi.org/10.70729/ijser1567.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Teses / dissertações sobre o assunto "Security solutions"

1

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Texto completo da fonte
Resumo:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des appareils de l'Internet des Objets (IoT) et l'importance cruciale de leur sécurisation dans notre monde de plus en plus interconnecté. Dans le domaine en constante expansion de l'IoT, la sécurisation des réseaux de capteurs sans fil (WSN) présente un défi unique. Ces réseaux, composés de nœuds de capteurs à ressources limitées, jouent un rôle vital dans diverses applications, agissant comme des sentinelles de notre environnement physique. Cependant, leur puissance de traitement limitée et leur durée de vie de batterie les rendent vulnérables aux cyberattaques. Garantir l'intégrité et la sécurité des données collectées par les WSN est primordial. Cette thèse aborde ce défi en adoptant une approche à deux volets, traitant de la sécurité à la fois du point de vue du réseau et du développement logiciel.Le premier facette présente un schéma d'authentification léger et novateur, conçu pour répondre aux exigences strictes des RSN contraintes par la puissance. En surmontant la charge computationnelle des techniques cryptographiques traditionnelles, ce protocole innovant assure une communication sécurisée tout en minimisant la consommation de ressources, améliorant ainsi considérablement l'efficacité et la fiabilité des réseaux de capteurs sans fil. Cette contribution est validée par une série de méthodes d'évaluation, notamment la mise en œuvre en temps réel, les tests d'exactitude et les évaluations de l'efficacité énergétique. Ces méthodes démontrent l'efficacité et la practicalité du schéma proposé. La deuxième facette introduit Shmulik, un système basé sur le Deep Learning conçu pour détecter des vulnérabilités logicielles, en particulier pour les systèmes embarqués et à ressources limitées. Les méthodes traditionnelles de fortification de ces systèmes ont souvent un coût, nécessitant une mémoire accrue, une puissance de traitement plus importante ou du matériel dédié, ce qui met encore plus à rude épreuve leurs ressources limitées. Shmulik offre une alternative intéressante. En exploitant l'apprentissage profond, nous visons à développer un système capable d'analyser automatiquement le code et de repérer les faiblesses de sécurité potentielles dès le début du processus de développement. La justification de cette double approche réside dans la recherche d'un cadre de sécurité complet. Un schéma d'authentification robuste sécurise la communication au sein du WSN, tandis que Shmulik protège l'ensemble du firmware des vulnérabilités. Les schémas d'authentification traditionnels seuls pourraient ne pas être suffisants si le logiciel lui-même présente des faiblesses exploitables. À l'inverse, l'efficacité de Shmulik repose sur les canaux de communication sécurisés qu'un schéma d'authentification léger peut fournir. En abordant la sécurité au niveau du réseau et du logiciel, nous visons à créer un système de défense plus résilient. Cette thèse comble le fossé entre les solutions de sécurité légères pour les réseaux à ressources limitées et les techniques d'apprentissage profond de pointe pour l'analyse des vulnérabilités logicielles. En explorant ces deux pistes, nous nous efforçons de contribuer à un avenir plus sûr et plus fiable pour les WSN, améliorant ainsi la fiabilité et l'efficacité de cette technologie en évolution rapide<br>A few years ago, a cybersecurity incident could easily have been the scenario of a Hollywood movie: attackers exploited an unexpected entry point: a smart thermometer in the casino's lobby fish tank. This Internet of Things (IoT) device had access to the casino's network, and the hackers managed to compromise it. They then used this initial foothold to access other parts of the network and ultimately exfiltrated 20GB of sensitive data, including high-roller customer information.This audacious exploit highlights the vulnerability of IoT devices and the critical importance of securing them in our increasingly interconnected world. In the ever-expanding realm of the Internet of Things (IoT), securing Wireless Sensor Networks (WSNs) presents a unique challenge. These networks, composed of resource-constrained sensor nodes, play a vital role in various applications, acting as the sentinels of our physical environment. However, their limited processing power and battery life make them vulnerable to cyberattacks. Ensuring the integrity and security of the data collected by WSNs is paramount.This thesis tackles this challenge with a two-pronged approach, addressing security from both the network and software development perspectives.The first facet explores the development of a lightweight authentication scheme specifically designed for power-constrained WSNs. By overcoming the computational overhead of traditional cryptographic techniques, this innovative protocol ensures secure communication while minimizing resource consumption, thereby significantly enhancing the efficiency and reliability of wireless sensor networks. This contribution is validated through a range of evaluation methods, including real-time implementation, accuracy testing, and energy efficiency assessments. These methods demonstrate the effectiveness and practicality of the proposed scheme.The second facet introduces Shmulik, a deep learning-based system crafted to unearth software vulnerabilities, especially for embedded and resource-constrained devices. Traditional methods of fortifying these systems often come at a cost, requiring increased memory, processing power, or dedicated hardware, further straining their limited resources. Shmulik offers a compelling alternative. By leveraging deep learning, we aim to develop a system that can automatically analyze code and pinpoint potential security weaknesses early in the development process. Shmulik's effectiveness is validated by a comprehensive evaluation, including experimental tests, tool comparisons, a case study, and the detection of zero-day vulnerabilities.The rationale for this dual approach lies in the pursuit of a comprehensive security framework. A robust authentication scheme secures communication within the WSN, while Shmulik safeguards the whole firmware from vulnerabilities. Traditional authentication schemes alone might not be sufficient if the software itself has exploitable weaknesses. Conversely, Shmulik's effectiveness relies on the secure communication channels that a lightweight authentication scheme can provide. By addressing security at both network and software levels, we aim to create a more resilient defense system.This thesis bridges the gap between lightweight security solutions for resource-constrained networks and cutting-edge deep learning techniques for software vulnerability analysis. By exploring both avenues, we strive to contribute to a more secure and reliable future for WSNs, ultimately enhancing the trustworthiness and effectiveness of this rapidly evolving technology
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Mustafa, Ali, Nasir Siddique, and Mubeen Zubair. "DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.

Texto completo da fonte
Resumo:
The Open Systems Interconnect Model (OSI) is a conceptual model of networking thatcategorizes network functions into seven layers. It is defined in this model that how layerscommunicate with each other. In this thesis, we address common Layer 2 attacks and theirsolutions. Layer 2 is considered a very weak link in a secure network. If the data is compromisedat Layer 2, it cannot be detected at other layers because each layer works without the knowledgeof other layers. We discuss Layer 2 weakness and vulnerability exploitation tools briefly. It isexplained how an attacker can exploit network by using different attack tools. Our results showthat these attacks are very productive if a network administrator does not implement propersecurity at Layer 2 in the OSI model. We propose solutions to secure Layer 2 devices and thesesolutions are implemented by using attack tools. Security configurations are deployed to combatagainst attacks and protect the integrity, confidentiality, and availability of the network traffic.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Alsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ho, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Texto completo da fonte
Resumo:
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.<br>published_or_final_version<br>Computer Science<br>Master<br>Master of Philosophy
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.

Texto completo da fonte
Resumo:
This thesis is centred on the question of the effect security technologies, and the imaginaries associated with them, have on the formation of the present security doxa. With a more nuanced understanding of technology as process, and the role of imagination reintroduced into the nexus, this thesis aims to enable an understanding of how technological security solutions are deployed in everyday life and how this contributes to a reformulating of politics in a world gripped by anxiety about an uncertain future. Of primary interest is the way in which seemingly mundane technologies can enter the dominant security narrative and achieve deployment in everyday life, not only as the prime solution to concerns of risk, but as something to actively be desired in themselves. A vital and understudied arena for the dissemination of specific imaginaries of mundane security tools as the ultimate solution to a risky future – as an end in and of themselves – are the spaces of promotion for such technologies. The centrepiece of promotion is found at the trade fairs and exhibitions where one can witness the marketing and sale of the ‘latest and greatest’ tech fixes from an ever increasing range of private sector security entrepreneurs whose living is made from promoting security. By offering both a mapping of the wider expansion and logic of the security fair world, and an ethnographic study of interactions within the exhibition walls of the International Fire and Security Exhibition and Conference (IFSEC) over the course of three years, this thesis makes it possible to develop a better understanding of both the makeup and relations between these elements, and expose these gatherings as more than just sites of commerce and consumption, and much more than simply a metaphor for the wider security world. Instead, they can be thought of as hotspots of intensive exchange of knowledge, new ideas and network building. Thus, this thesis aims to demonstrate how international trade fairs and exhibitions are more than just an ever more important means of distributing security technologies. It is not a question of the relationship between visitors and exhibitors, or the particular effectiveness of marketing strategies deployed by individual firms. It is about the underpinning logic of a particular mind-set regarding what it means to consume security as a commodity, and a specific imagining of a secured future with such solutions as the ultimate end-in-themselves and how these spaces are pivotal in the dissemination, propagation and reformulation of changing attitudes towards security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Raza, Shahid. "Lightweight Security Solutions for the Internet of Things." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.

Texto completo da fonte
Resumo:
The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs). This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operations. Therefore, among many other issues, the challenge of implementing secure communication in the IoT must be addressed. The traditional Internet has established and tested ways of securing networks. The IoT is a hybrid network of the Internet and resource-constrained networks, and it is therefore reasonable to explore the options of using security mechanisms standardized for the Internet in the IoT. The IoT requires multi-facet security solutions where the communication is secured with confidentiality, integrity, and authentication services; the network is protected against intrusions and disruptions; and the data inside a sensor node is stored in an encrypted form. Using standardized mechanisms, communication in the IoT can be secured at different layers: at the link layer with IEEE 802.15.4 security, at the network layer with IP security (IPsec), and at the transport layer with Datagram Transport Layer Security (DTLS). Even when the IoT is secured with encryption and authentication, sensor nodes are exposed to wireless attacks both from inside the WSN and from the Internet. Hence an Intrusion Detection System (IDS) and firewalls are needed. Since the nodes inside WSNs can be captured and cloned, protection of stored data is also important. This thesis has three main contributions. (i) It enables secure communication in the IoT using lightweight compressed yet standard compliant IPsec, DTLS, and IEEE 802.15.4 link layer security; and it discusses the pros and cons of each of these solutions. The proposed security solutions are implemented and evaluated in an IoT setup on real hardware. (ii) This thesis also presents the design, implementation, and evaluation of a novel IDS for the IoT. (iii) Last but not least, it also provides mechanisms to protect data inside constrained nodes. The experimental evaluation of the different solutions shows that the resource-constrained devices in the IoT can be secured with IPsec, DTLS, and 802.15.4 security; can be efficiently protected against intrusions; and the proposed combined secure storage and communication mechanisms can significantly reduce the security-related operations and energy consumption.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Texto completo da fonte
Resumo:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du niveau de sécurité dans ces systèmes ne devrait pas leur imposer des contraintes lourdes telles qu’une grande complexité de calcul ou encore une forte consommation d'énergie. En effet, l'efficacité énergétique est devenue récemment un besoin critique pour les opérateurs afin de réduire l’empreinte écologique et les coûts opérationnels de ces systèmes. Les services de sécurité dans les réseaux mobiles tels que l'authentification, la confidentialité et l'intégrité des données sont le plus souvent effectués en utilisant des techniques cryptographiques. Toutefois, la plupart des solutions standardisées déjà adoptées par le 3GPP dépendent des algorithmes de chiffrement qui possèdent une grande complexité, induisant une consommation énergétique plus élevée dans les différentes entités communicantes du réseau. La confidentialité des données, qui se réfère principalement au fait de s'assurer que l'information n'est accessible qu'à ceux dont l'accès est autorisé, est réalisée au niveau de la sous-couche PDCP (Packet Data Convergence Protocol) de la pile protocolaire de LTE/LTE-A par l'un des trois algorithmes normalisés (EEA1, EEA2 et EEA3). Or, chacun des trois algorithmes exige une forte complexité de calcul car ils reposent sur la théorie de chiffrement de Shannon qui utilise les fonctions de confusion et de diffusion sur plusieurs itérations. Dans cette thèse, nous proposons un nouvel algorithme de confidentialité en utilisant le concept de substitution et de diffusion dans lequel le niveau de sécurité requis est atteint en un seul tour. Par conséquent, la complexité de calcul est considérablement réduite ce qui entraîne une réduction de la consommation d'énergie par les fonctions de chiffrement et de déchiffrement. De plus, la même approche est utilisée pour réduire la complexité des algorithmes 3GPP d'intégrité des données (EIA1, EIA2 et EIA3) dont le concept de chiffrement repose sur les mêmes fonctions complexes. Enfin, nous étudions dans cette thèse le problème d'authentification dans le contexte du paradigme D2D (Device to Device communications) introduit dans les systèmes 4G. Le concept D2D se réfère à la communication directe entre deux terminaux mobiles sans passer par le cœur du réseau. Il constitue un moyen prometteur pour améliorer les performances et réduire la consommation d'énergie dans les réseaux LTE/LTE-A. Toutefois, l'authentification et la dérivation de clé entre deux terminaux mobiles dans le contexte D2D n’ont pas fait l’objet d’études. Aussi, nous proposons un nouveau protocole léger d’authentification et de dérivation de clé permettant d’authentifier les terminaux D2D et de dériver les clés nécessaires à la fois pour le cryptage et pour la protection de l'intégrité des données<br>Recently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Lejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.

Texto completo da fonte
Resumo:
The Internet continues to expand drastically as a result of explosion of mobile devices, content, server virtualization, and advancement of cloud services. This increase has significantly changed traffic patterns within the enterprise data centres. Therefore, advanced technologies are needed to improve traditional network deployments to enable them to handle the changing network patterns. Software defined networks (SDN) and network function virtualisation (NFV) are innovative technologies that enable network flexibility, increase network and service agility, and support service-driven virtual networks using concepts of virtualisation and softwarisation. Collaboration of these two concepts enable cloud operator to offer network-as-a-service (NaaS) to multiple tenants in a data-centre deployment. Despite the benefits brought by these technologies, they also bring along security challenges that need to be addressed and managed to ensure successful deployment and encourage faster adoption in industry. This dissertation proposes security solution based on tenant isolation, network access control (NAC) and network reconfiguration that can be implemented in NFV multi-tenant deployment to guarantee privacy and security of tenant functions. The evaluation of the proof-of-concept framework proves that SDN based tenant isolation solution provides a high level of isolation in a multi-tenant NFV cloud. It also shows that the proposed network reconfiguration greatly reduces chances of an attacker correctly identifying location and IP addresses of tenant functions within the cloud environment. Because of resource limitation, the proposed NAC solution was not evaluated. The efficiency of this solution for multitenancy NFV has been added as part of future work.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Livros sobre o assunto "Security solutions"

1

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

M, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Mueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Inc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. [United States]: IBM, International Technical Support Organization, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Mason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Capítulos de livros sobre o assunto "Security solutions"

1

Versluis, Gerald, and Steven Thewissen. "Network and Security." In Xamarin.Forms Solutions, 153–89. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Schreck, Jörg. "Solutions for Security." In Security and Privacy in User Modeling, 95–156. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Stevens, Alex. "Implementing Security Solutions." In Enterprise Fortress, 76–84. Boca Raton: CRC Press, 2025. https://doi.org/10.1201/9781003585923-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Widdowson, Amanda. "Mitigating solutions." In Humans and Cyber Security, 74–107. Boca Raton: CRC Press, 2025. https://doi.org/10.1201/9781003427681-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Li, Bin, and David Zhang. "Signature Security System for E-Commerce." In Biometric Solutions, 187–216. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Morton, Adam. "Managing Security and Access Control." In Mastering Snowflake Solutions, 67–98. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Khairallah, Michael. "Presenting the Solutions." In Physical Security Assessment Handbook, 188–201. 2nd ed. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.4324/9781003490432-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

McDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman, and David C. Knox. "Security Packages." In Mastering Oracle PL/SQL: Practical Solutions, 415–62. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ling, Lee Luan, and Miguel Gustavo Lizárraga. "Biometrics on the Internet: Security Applications and Services." In Biometric Solutions, 131–67. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

You, Jane, and David Zhang. "Web Guard: A Biometrics Identification System for Network Security." In Biometric Solutions, 217–41. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Security solutions"

1

Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA), 605–10. IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Harshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), 73–78. IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Jasser, Stefanie, and Matthias Riebisch. "Reusing security solutions." In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Fischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Fischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Spitz, Stephan, and Alexander Lawall. "Silicon-Integrated Security Solutions Driving IoT Security." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012350200003648.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Habbak, Hany, Khaled Metwally, and Ahmed Maher Mattar. "Securing Big Data: A Survey on Security Solutions." In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Adibi, S. "Comparative mobile platforms security solutions." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Mondol, Joel-Ahmed M. "Cloud security solutions using FPGA." In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032987.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Suomalainen, Jani, and Pasi Hyttinen. "Security Solutions for Smart Spaces." In 2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT). IEEE, 2011. http://dx.doi.org/10.1109/saint.2011.57.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Security solutions"

1

Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522104.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Boyens, Chantel, and Jack Smalligan. Social Security Customer Service Challenges: Causes, Impacts, and Solutions. Washington, DC: AARP Public Policy Institute, July 2024. http://dx.doi.org/10.26419/ppi.00239.001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Pudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1524811.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ward, Heather, and Sarah Brown. GNSI Decision Brief: Beyond Intervention: Sustainable Solutions for Haiti’s Security Needs. Tampa, FL: Global and National Security Institute, June 2024. http://dx.doi.org/10.5038/nlry9529.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Šulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, December 2024. https://doi.org/10.57005/ab.2024.3.4.

Texto completo da fonte
Resumo:
Electronic Voting Systems (EVS) has become more popular and has progressed despite many concerns about auditing and transparency. Authors present a technical solution for a prototype of a possible EVS. This prototype, with additional improvements, could be used as an EVS in Lithuania and other countries worldwide. This article is intended to show how EVS requirements relate to software solutions using open-source products.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Schulzrinne, H., E. Marocco, and E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, February 2010. http://dx.doi.org/10.17487/rfc5765.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Talebian, Sara, Frida Lager, and Katy Harris. Solutions for managing food security risks in a rapidly changing geopolitical landscape. Stockholm Environment Institute, November 2024. http://dx.doi.org/10.51414/sei2024.044.

Texto completo da fonte
Resumo:
The authors adopt a geopolitical lens to better understand policy responses to food insecurities under reversal of global integration and weakening multilateralism. They specifically focus on transboundary climate risks to food production and trade: how climate impacts on agriculture can generate cascading effects through international trade and global supply chains to catalyse risks to countries worldwide.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, March 2025. https://doi.org/10.62311/nesx/rrv225.

Texto completo da fonte
Resumo:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats, such as adversarial machine learning, model poisoning, and API exploitation, while analyzing AI-powered cybersecurity techniques for threat detection, anomaly prediction, and zero-trust security. The study also examines the role of cryptographic solutions, including homomorphic encryption, federated learning security, and post-quantum cryptography, in safeguarding AI models and data integrity. By integrating AI with cutting-edge cybersecurity strategies, this research aims to enhance resilience, compliance, and trust in AI-driven infrastructures. Future advancements in AI security, blockchain-based authentication, and quantum-enhanced cryptographic solutions will be critical in securing next-generation AI applications in cloud and edge environments. Keywords: AI security, adversarial machine learning, cloud computing security, edge computing security, zero-trust AI, homomorphic encryption, federated learning security, post-quantum cryptography, blockchain for AI security, AI-driven threat detection, model poisoning attacks, anomaly prediction, cyber resilience, decentralized AI security, secure multi-party computation (SMPC).
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Research Team, Karamoja–Turkana Community. Community Solutions to Insecurity Along the Uganda–Kenya Border. Institute of Development Studies, December 2023. http://dx.doi.org/10.19088/ids.2023.057.

Texto completo da fonte
Resumo:
In the Karamoja and Turkana border regions of Uganda and Kenya, there is widespread violence including armed robbery, rape, and human rights abuses, yet community complaints about failures of governance remain largely unaddressed. This Policy Briefing highlights how different insecurities reinforce one another in ways exacerbated by the international border. It stresses the need for fulfilment of the two governments’ commitments to cross-border solutions, and suggests that international policy actors can help communities gain leverage with governments towards building trustworthy and effective peace and security institutions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!