• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,508
Next 10 →

Table :Security-

in Consistent Object-Based Software Construction for Embedded Applications
by Cornelia Heinisch, Joachim Goll
Cited by 1

Tablesize Security

in A Criterion and Schemes on the Random Oracle Model
by Manabu Suzuki, Keisuke Tanaka, Manabu Suzuki, Keisuke Tanaka 2004

Table 3: Security services - Security mechanisms relationship

in Trusted Third Party Services for Deploying Secure Telemedical Applications over the WWW
by Diomidis Spinellis , Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis Katsikas 1999
"... In PAGE 6: ... The security solution proposed in this paper is based on secure Web communication and TTP services. The available security concepts and technologies are presented in Table3 . Among them, the mechanisms proposed and utilised by our approach are denoted in italics.... ..."
Cited by 1

Table 2: Security objectives and security services mapping

in Understanding Trust and Security
by Pradip Lamsal 2001
Cited by 7

Table 1. Mapping security policies to security attributes

in An Editor for Adaptive XML-Based Policy Management of IPsec
by Raj Mohan, Timothy E. Levin, Cynthia E. Irvine

TABLE II SECURITY MEASURES Threat Security Measures

in Service Safety through a Preliminary Evaluation
by Donghoon Shin, Yunmook Nah, Hoseong Kim, Gang Shin Lee, Jae-il Lee

TABLE II SECURITY MEASURES Threat Security Measures

in Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluation of the Information Security of the New
by It Service, Donghoon Shin, Yunmook Nah, Hoseong Kim, Gang Shin Lee, Jae-il Lee

Table 6: Security Environment to Security Objectives Mapping

in unknown title
by unknown authors

Table 1 . Security Applications

in Management of Network Security Applications
by Philip Hyland Ph, Ravi Sandhu 1998
Cited by 3

Table 2: Security objectives

in Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
by Rodolphe Ortalo, Yves Deswarte 1999
"... In PAGE 11: ... To select a precise attacker we choose the insider set of privileges defined in Section 2. Table2 summarizes these case studies. For the analysis of the second security objective, one problem appears due to the existence of superusers in Unix.... ..."
Cited by 57
Next 10 →
Results 1 - 10 of 3,508
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University