Results 291 to 300 of about 834,303 (333)
Some of the next articles are maybe not open access.

Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy

Network and Distributed System Security Symposium, 2016
Jakub Czyz   +3 more
semanticscholar   +1 more source

Automatic Security Policy Management in Modern Networks

2005
Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for ...
openaire   +1 more source

A novel approach for integrating security policy enforcement with dynamic network virtualization

IEEE Conference on Network Softwarization, 2015
C. Basile   +4 more
semanticscholar   +1 more source

Enforcing Multilevel Security Policies in Unstable Networks

IEEE Transactions on Network and Service Management, 2022
Quinn Burke   +6 more
openaire   +1 more source

American Cancer Society nutrition and physical activity guideline for cancer survivors

Ca-A Cancer Journal for Clinicians, 2022
Cheryl L Rock   +2 more
exaly  

Policy-Based Security for M-Commerce Networks

2008
In this chapter we present an overview of a general policy-based security architecture for securing the confidentiality, authenticity, and integrity of enterprise m-commerce data. A policy-based architecture protects data based on content and sensitivity and highly surpasses the performance of bulk encryption protocols such as SSL and TLS by utilizing ...
openaire   +1 more source

Genetic-Feedback Algorithm Based Network Security Policy Framework

International Conference on Wireless Communications, Networking and Mobile Computing, 2007
Xiao-Su Chen, Jin-hua Wu, Ni Jun
semanticscholar   +1 more source

American Cancer Society's report on the status of cancer disparities in the United States, 2021

Ca-A Cancer Journal for Clinicians, 2022
Farhad Islami   +2 more
exaly  

A Network Security Policy Model and Its Realization Mechanism

Conference on Information Security and Cryptology, 2006
Chenghua Tang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy