Results 261 to 270 of about 186,948 (311)

Network Security [PDF]

open access: possibleSSRN Electronic Journal, 2011
In a variety of settings, some payoff-relevant item spreads along a network of connected individuals. In some cases, the item will benefit those who receive it (for example, a music download, a stock tip, news about a new research funding source, etc.) while in other cases the impact may be negative (for example, viruses, both biological and electronic,
Ramakrishna Thurimella, Leemon C. Baird
  +8 more sources

Network security (security in large networks)

Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2002
It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals.
S. Singh, M. Singh
openaire   +2 more sources

Network Security

Proceedings of the 4th annual conference on Information security curriculum development, 2007
Information Security has emerged as one of the biggest concerns that network administrators and other stakeholders face today. Most data custodians face Information Security risks on a daily basis; thus, it is up to Information Security professionals to research these threats and exploits to secure private information from unauthorized access and ...
openaire   +3 more sources

Securing Network Servers [PDF]

open access: possible, 1999
Abstract : The development of computer networks has resulted in an important class of computers: network servers. The primary purpose of these machines is to provide services, including both computational and data services, to other computers on the network. Because of their service role, it is common for servers to store many of an organization's most
Klaus-Peter Kossakowski   +4 more
openaire   +1 more source

Secure Network Objects

Proceedings 1996 IEEE Symposium on Security and Privacy, 1999
We describe the design and implementation of secure network objects, which provide security for object-oriented network communication. The design takes advantage of objects and subtyping to present a simple but expressive programming interface for security, supporting both access control lists and capabilities.
L. van Doorn   +3 more
openaire   +2 more sources

Network and Security

2018
In the previous chapter, we saw how to work with data. Most of this data will probably come from some kind of backend over a network. In this chapter, we see how we can transfer this data from a backend to our app in several ways. Associated with sending and receiving data is connectivity.
Steven Thewissen, Gerald Versluis
openaire   +2 more sources

Security in Sensor Networks

2008
The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to ...
openaire   +2 more sources

Managing network security: Simulating network security

Network Security, 1999
Abstract Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities.
openaire   +2 more sources

Home - About - Disclaimer - Privacy