Results 311 to 320 of about 2,319,668 (347)
Some of the next articles are maybe not open access.

A Survey on Security as a Service

2017
Security as a Service (SECaaS) has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud Computing but still not very widely investigated. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud.
Sira Yongchareon, Wenyuan Wang
openaire   +2 more sources

A Taxonomy of Security as a Service

2018
With the evolving expansion of threat landscape (i.e., internal and external) and the growing shortage of cybersecurity resources (i.e., tools and skills), Security as a Service (SecaaS) is gaining a momentum to fill this pressing gap. In this paper, we propose a taxonomy of existing research work in SecaaS.
Marwa Elsayed, Mohammad Zulkernine
openaire   +2 more sources

The Security Service Mandate

2020
This chapter traces the steps taken to implement the Stewart Report, and the fresh mandate for the Security Service which it produced. This was the Attlee Directive, a bowdlerized version of which adopted in 1952 became known as the Maxwell Fyfe Directive, diluting the political supervision of the Service which the Attlee Directive had embraced.
openaire   +1 more source

Technology and security services

Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), 1999
Are current security requirements the same as they were a few years ago? For reasons which are obvious to all of us who work in this sector, we have to answer no. Not only because they have increased or decreased, but because they are different, because they have been changing as the years have gone by.
openaire   +2 more sources

Security Services and Cryptography

1999
The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: kryptos, which means hidden and logos, which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used
Mark Vandenwauver, Paul Ashley
openaire   +2 more sources

Secure Web Services with WS-Security

2004
Companies Have Not widely adopted Web services technology to this point because the technology has lacked a security specification that can ensure the integrity of transmitted messages and data. The WS-Security specification is a joint effort by Microsoft, IBM, and VeriSign to address this most important issue.
openaire   +2 more sources

Security of Service Networks

2010
The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies ...
Dimitrakos T   +3 more
openaire   +3 more sources

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Service Oriented Security

2007
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire   +1 more source

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Home - About - Disclaimer - Privacy