Results 41 to 50 of about 8,618,364 (391)

Secure sessions for web services [PDF]

open access: yesProceedings of the 2004 workshop on Secure web service - SWS '04, 2004
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Ricardo Corin   +3 more
openaire   +5 more sources

Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service

open access: yesIEEE Access, 2019
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods.
Chang Choi, Junho Choi
semanticscholar   +1 more source

A Dynamic Composition Mechanism of Security Service Chaining Oriented to SDN/NFV-Enabled Networks

open access: yesIEEE Access, 2018
With the large-scale commercial application of data center networks, the security problem of data center network is attracting more and more attention.
Yicen Liu   +3 more
semanticscholar   +1 more source

Задача выбора пропускных способностей каналов связи транспортной сети, учитывающая разбалансировку трафика различного приоритета

open access: yesИнформатика и автоматизация, 2020
Предлагается вариант решения задачи выбора пропускных способностей цифровых каналов связи транспортной сети, учитывающий разбалансировку трафика данных по приоритетам.
Sergej Jur'evich Andreev   +2 more
doaj   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Исследование структурных свойств сети Интернет на основе метаграфовых моделей

open access: yesИнформатика и автоматизация, 2020
При исследовании сети Интернет ее структуру разделяют на уровни: уровень автономных систем, уровень точек присутствия операторов связи, уровень оборудования и так далее.
Maxim Vladimirovich Ivanov   +2 more
doaj   +1 more source

Quality of security service

open access: yesProceedings of the 2000 workshop on New security paradigms, 2001
Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources.
Irvine, Cynthia E., Levin, Timothy E.
openaire   +3 more sources

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

open access: yesMobile Information Systems, 2017
Mobile-Edge Computing (MEC) is a novel and sustainable network architecture that enables energy conservation with cloud computing and network services offloading at the edge of mobile cellular networks.
Guanwen Li   +6 more
semanticscholar   +1 more source

Modern approaches to carrying out profound medical examination of servicemen of Security Service of Ukraine [PDF]

open access: yesMedičnì Perspektivi, 2013
The study found that the regulatory framework for prophylactic medical examination in the Security Service of Ukraine (SSU) is not fully regulated, this required the development and validation of a new organizational model to improve its efficiency.
Lurin I.A.   +5 more
doaj  

Tailored Security: Building Nonrepudiable Security Service-Level Agreements [PDF]

open access: yesIEEE Vehicular Technology Magazine, 2013
The security features of current digital services are mostly defined and dictated by the service provider (SP). A user can always decline to use a service whose terms do not fulfill the expected criteria, but in many cases, even a simple negotiation ...
Takeshi Takahashi   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy