Results 341 to 350 of about 8,750,178 (391)
Some of the next articles are maybe not open access.
Security Services and Cryptography
1999The origin of the word cryptology lies in ancient Greek. The word cryptology is made up of two components: kryptos, which means hidden and logos, which means word. Cryptology is as old as writing itself, and has been used for thousands of years to safeguard military and diplomatic communications. For example, the famous Roman emperor Julius Caesar used
Mark Vandenwauver, Paul Ashley
openaire +2 more sources
2020
This chapter traces the steps taken to implement the Stewart Report, and the fresh mandate for the Security Service which it produced. This was the Attlee Directive, a bowdlerized version of which adopted in 1952 became known as the Maxwell Fyfe Directive, diluting the political supervision of the Service which the Attlee Directive had embraced.
openaire +1 more source
This chapter traces the steps taken to implement the Stewart Report, and the fresh mandate for the Security Service which it produced. This was the Attlee Directive, a bowdlerized version of which adopted in 1952 became known as the Maxwell Fyfe Directive, diluting the political supervision of the Service which the Attlee Directive had embraced.
openaire +1 more source
2010
The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies ...
Dimitrakos T+3 more
openaire +3 more sources
The way enterprises conduct business today is changing greatly. The enterprise has become more pervasive with a mobile workforce, outsourced data centers, different engagements with customers and distributed sites [19.1, 2]. In addition, companies seeking to optimize their processes across their supply chains are implementing integration strategies ...
Dimitrakos T+3 more
openaire +3 more sources
Cloud Computing Security: A Survey of Service-based Models
Computers & security, 2021Fatemeh Khoda Parast+5 more
semanticscholar +1 more source
2007
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire +1 more source
Service-oriented architecture (SOA) is a set of principles for designing extensible, federated and interoperable services, and it represents a new evolutional spiral in the program-applications development and in the evolution of the information systems concept. Development and increase number of SOA implementations brings out the SOA based information
Gerić, Sandro, Hutinski, Željko
openaire +1 more source
DPX: Data-Plane eXtensions for SDN Security Service Instantiation
International Conference on Detection of intrusions and malware, and vulnerability assessment, 2019Taejune Park+6 more
semanticscholar +1 more source
EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security
International Conference on Fog and Edge Computing, 2017Kewei Sha+4 more
semanticscholar +1 more source
International Symposium on Computational Intelligence and Design, 2016
Jiakailin Wang+5 more
semanticscholar +1 more source
Jiakailin Wang+5 more
semanticscholar +1 more source
A Security Service on-demand Architecture in SDN
Information and Communication Technology Convergence, 2016Li-Der Chou+5 more
semanticscholar +1 more source