Results 11 to 20 of about 198,702 (277)

Investigating SRAM PUFs in large CPUs and GPUs [PDF]

open access: yes, 2015
Physically unclonable functions (PUFs) provide data that can be used for cryptographic purposes: on the one hand randomness for the initialization of random-number generators; on the other hand individual fingerprints for unique identification of ...
Bernstein, Daniel J.   +2 more
core   +5 more sources

Zero-Trust Model for Smart Manufacturing Industry

open access: yesApplied Sciences, 2022
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to
Biplob Paul, Muzaffar Rao
doaj   +1 more source

Research on Satellite Internet Security Protection Based on Zero Trust

open access: yes天地一体化信息网络, 2021
Satellite internet, as a new infrastructure, is an important part of China's future information infrastructure, and its security importance is self-evident.Based on the typical architecture of satellite internet system, the security risks faced by ...
Yufei SONG   +3 more
doaj   +2 more sources

Application protection in 5G cloud network using zero trust architecture

open access: yesDianxin kexue, 2020
Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was
Guofeng HE
doaj   +2 more sources

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

Design for sustainable architecture and environments [PDF]

open access: yes, 2008
This paper describes some of the research outcomes of a Knowledge Transfer Partnership (KTP) project partly funded by Department of Trade and Industry, UK.
Fieldson, Rosemary   +2 more
core   +1 more source

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments [PDF]

open access: yes, 2017
Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial.
Danezis, George   +3 more
core   +4 more sources

Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]

open access: yes, 2013
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem   +2 more
core   +2 more sources

3PAC: Enforcing Access Policies for Web Services [PDF]

open access: yes, 2005
Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.
Bemmel, J. van   +2 more
core   +2 more sources

Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal
As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation,
Pushpendra Kumar Verma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy