Results 21 to 30 of about 2,344,167 (352)
Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources.
Irvine, Cynthia E., Levin, Timothy E.
openaire +2 more sources
Criminal law protection of critical infrastructure objects against subversive encroachments
The norms of domestic and foreign legislation, which establish a criminal law prohibition of encroachments on objects of critical importance for the economy, defense and life support of the population for subversive purposes, have been studied.
О. V. Shamsutdinov, D. S. Melnyk
doaj +1 more source
Constructing secure service compositions with patterns [PDF]
In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service.
Pino, L., Spanoudakis, G.
core +1 more source
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches.
Welch, Von +9 more
openaire +2 more sources
Security Issues in a SOA-based Provenance System [PDF]
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong +9 more
core +2 more sources
A Secure Broadcast Service for LDACS with an Application to Secure GBAS [PDF]
The VHF Data Broadcast (VDB) data link is responsible for transmitting Ground Based Augmentation System (GBAS) corrections from the GBAS ground station to the aircraft. Thus, it is a major bottleneck for the evolution and security of GBAS. It provides limited bandwidth, range, only line-of-sight capabilities, and no cyber-security protections for the ...
Mäurer, Nils +4 more
openaire +3 more sources
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
Prioritisation of network security services [PDF]
On large networks security administration tasks such as patch management and event log analysis can take many hours and even days to successfully complete even with automated solutions. Currently it is left to the systems administrators' discretion to choose in which order to protect individual devices.
Hayat, MZ, Reeve, JS, Boutle, CJ
openaire +2 more sources
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
It has been proved that the introduction of a cyclic system of professional training of specialists in economic security of enterprises and organizations contributes to increasing the efficiency of their functioning, competitiveness, financial and ...
M. N. Vlasenko +2 more
doaj +1 more source

