Auswahl der wissenschaftlichen Literatur zum Thema „Security solutions“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security solutions" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Security solutions"

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai und Bhagyashri D. Dangewar. „Cloud Security: Problems and Solutions“. International Journal of Scientific Research 3, Nr. 4 (01.06.2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Xu, Vincent. „Data Security Solutions“. RESEARCH REVIEW International Journal of Multidisciplinary 05, Nr. 07 (15.07.2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Webb, K. W. „Biometric Security Solutions“. IEEE Security and Privacy Magazine 3, Nr. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

GOHOREANU, Bogdan, Florin SANDU und Dan-Nicolae ROBU. „SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS“. SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, Nr. 1 (31.07.2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

WEBER, CYNTHIA, und MARK LACY. „Securing by design“. Review of International Studies 37, Nr. 3 (01.03.2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Der volle Inhalt der Quelle
Annotation:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of ‘security solutions’ – a securing by design – a Redesigning Security Approach explores how we mightinsecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us ‘safe’.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman und Ayaz Ali Khan. „Grid High Availability and Service Security Issues with Solutions“. International Journal of Engineering and Technology 4, Nr. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

GEANĂ, Ionuţ Cătălin. „Security Solutions for Informatics Systems“. International Journal of Information Security and Cybercrime 1, Nr. 2 (21.12.2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dhiman, Deepika. „WLAN Security Issues and Solutions“. IOSR Journal of Computer Engineering 16, Nr. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker und Joseph R. Keebler. „Telemedicine Security: Challenges and Solutions“. Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, Nr. 1 (Juni 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.

Der volle Inhalt der Quelle
Annotation:
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthesizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) literature. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As the transition from traditional care continues to develop, we seek to better understand emerging vulnerabilities, identify crucial cyber hygiene practices, and provide insights on how to improve the safety of patient data in virtual care. Telemedicine is here to stay, and lessons learned from the pandemic are likely to remain useful.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov und Alexander Alexandrovich Adamenko. „Food security: problems and solutions“. Proceedings of the Kuban State Agrarian University, Nr. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Security solutions"

1

Mustafa, Ali, Nasir Siddique und Mubeen Zubair. „DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.

Der volle Inhalt der Quelle
Annotation:
The Open Systems Interconnect Model (OSI) is a conceptual model of networking thatcategorizes network functions into seven layers. It is defined in this model that how layerscommunicate with each other. In this thesis, we address common Layer 2 attacks and theirsolutions. Layer 2 is considered a very weak link in a secure network. If the data is compromisedat Layer 2, it cannot be detected at other layers because each layer works without the knowledgeof other layers. We discuss Layer 2 weakness and vulnerability exploitation tools briefly. It isexplained how an attacker can exploit network by using different attack tools. Our results showthat these attacks are very productive if a network administrator does not implement propersecurity at Layer 2 in the OSI model. We propose solutions to secure Layer 2 devices and thesesolutions are implemented by using attack tools. Security configurations are deployed to combatagainst attacks and protect the integrity, confidentiality, and availability of the network traffic.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Alsaid, Adil. „Enhancing end user security : attacks and solutions“. Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bailey, Carmen F. „Analysis of security solutions in large enterprises“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ho, Sze-lok, und 何思樂. „Technical solutions for conducting investigations in digital age“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Der volle Inhalt der Quelle
Annotation:
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.
published_or_final_version
Computer Science
Master
Master of Philosophy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Alexander, James. „Promoting security imaginaries : an analysis of the market for everyday security solutions“. Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.

Der volle Inhalt der Quelle
Annotation:
This thesis is centred on the question of the effect security technologies, and the imaginaries associated with them, have on the formation of the present security doxa. With a more nuanced understanding of technology as process, and the role of imagination reintroduced into the nexus, this thesis aims to enable an understanding of how technological security solutions are deployed in everyday life and how this contributes to a reformulating of politics in a world gripped by anxiety about an uncertain future. Of primary interest is the way in which seemingly mundane technologies can enter the dominant security narrative and achieve deployment in everyday life, not only as the prime solution to concerns of risk, but as something to actively be desired in themselves. A vital and understudied arena for the dissemination of specific imaginaries of mundane security tools as the ultimate solution to a risky future – as an end in and of themselves – are the spaces of promotion for such technologies. The centrepiece of promotion is found at the trade fairs and exhibitions where one can witness the marketing and sale of the ‘latest and greatest’ tech fixes from an ever increasing range of private sector security entrepreneurs whose living is made from promoting security. By offering both a mapping of the wider expansion and logic of the security fair world, and an ethnographic study of interactions within the exhibition walls of the International Fire and Security Exhibition and Conference (IFSEC) over the course of three years, this thesis makes it possible to develop a better understanding of both the makeup and relations between these elements, and expose these gatherings as more than just sites of commerce and consumption, and much more than simply a metaphor for the wider security world. Instead, they can be thought of as hotspots of intensive exchange of knowledge, new ideas and network building. Thus, this thesis aims to demonstrate how international trade fairs and exhibitions are more than just an ever more important means of distributing security technologies. It is not a question of the relationship between visitors and exhibitors, or the particular effectiveness of marketing strategies deployed by individual firms. It is about the underpinning logic of a particular mind-set regarding what it means to consume security as a commodity, and a specific imagining of a secured future with such solutions as the ultimate end-in-themselves and how these spaces are pivotal in the dissemination, propagation and reformulation of changing attitudes towards security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Skaria, Sherin, und Fazely Hamedani Amir Reza. „Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network“. Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Raza, Shahid. „Lightweight Security Solutions for the Internet of Things“. Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.

Der volle Inhalt der Quelle
Annotation:
The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs). This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operations. Therefore, among many other issues, the challenge of implementing secure communication in the IoT must be addressed. The traditional Internet has established and tested ways of securing networks. The IoT is a hybrid network of the Internet and resource-constrained networks, and it is therefore reasonable to explore the options of using security mechanisms standardized for the Internet in the IoT. The IoT requires multi-facet security solutions where the communication is secured with confidentiality, integrity, and authentication services; the network is protected against intrusions and disruptions; and the data inside a sensor node is stored in an encrypted form. Using standardized mechanisms, communication in the IoT can be secured at different layers: at the link layer with IEEE 802.15.4 security, at the network layer with IP security (IPsec), and at the transport layer with Datagram Transport Layer Security (DTLS). Even when the IoT is secured with encryption and authentication, sensor nodes are exposed to wireless attacks both from inside the WSN and from the Internet. Hence an Intrusion Detection System (IDS) and firewalls are needed. Since the nodes inside WSNs can be captured and cloned, protection of stored data is also important. This thesis has three main contributions. (i) It enables secure communication in the IoT using lightweight compressed yet standard compliant IPsec, DTLS, and IEEE 802.15.4 link layer security; and it discusses the pros and cons of each of these solutions. The proposed security solutions are implemented and evaluated in an IoT setup on real hardware. (ii) This thesis also presents the design, implementation, and evaluation of a novel IDS for the IoT. (iii) Last but not least, it also provides mechanisms to protect data inside constrained nodes. The experimental evaluation of the different solutions shows that the resource-constrained devices in the IoT can be secured with IPsec, DTLS, and 802.15.4 security; can be efficiently protected against intrusions; and the proposed combined secure storage and communication mechanisms can significantly reduce the security-related operations and energy consumption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hussein, Soran. „Lightweight Security Solutions for LTE/LTE-A Networks“. Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Der volle Inhalt der Quelle
Annotation:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du niveau de sécurité dans ces systèmes ne devrait pas leur imposer des contraintes lourdes telles qu’une grande complexité de calcul ou encore une forte consommation d'énergie. En effet, l'efficacité énergétique est devenue récemment un besoin critique pour les opérateurs afin de réduire l’empreinte écologique et les coûts opérationnels de ces systèmes. Les services de sécurité dans les réseaux mobiles tels que l'authentification, la confidentialité et l'intégrité des données sont le plus souvent effectués en utilisant des techniques cryptographiques. Toutefois, la plupart des solutions standardisées déjà adoptées par le 3GPP dépendent des algorithmes de chiffrement qui possèdent une grande complexité, induisant une consommation énergétique plus élevée dans les différentes entités communicantes du réseau. La confidentialité des données, qui se réfère principalement au fait de s'assurer que l'information n'est accessible qu'à ceux dont l'accès est autorisé, est réalisée au niveau de la sous-couche PDCP (Packet Data Convergence Protocol) de la pile protocolaire de LTE/LTE-A par l'un des trois algorithmes normalisés (EEA1, EEA2 et EEA3). Or, chacun des trois algorithmes exige une forte complexité de calcul car ils reposent sur la théorie de chiffrement de Shannon qui utilise les fonctions de confusion et de diffusion sur plusieurs itérations. Dans cette thèse, nous proposons un nouvel algorithme de confidentialité en utilisant le concept de substitution et de diffusion dans lequel le niveau de sécurité requis est atteint en un seul tour. Par conséquent, la complexité de calcul est considérablement réduite ce qui entraîne une réduction de la consommation d'énergie par les fonctions de chiffrement et de déchiffrement. De plus, la même approche est utilisée pour réduire la complexité des algorithmes 3GPP d'intégrité des données (EIA1, EIA2 et EIA3) dont le concept de chiffrement repose sur les mêmes fonctions complexes. Enfin, nous étudions dans cette thèse le problème d'authentification dans le contexte du paradigme D2D (Device to Device communications) introduit dans les systèmes 4G. Le concept D2D se réfère à la communication directe entre deux terminaux mobiles sans passer par le cœur du réseau. Il constitue un moyen prometteur pour améliorer les performances et réduire la consommation d'énergie dans les réseaux LTE/LTE-A. Toutefois, l'authentification et la dérivation de clé entre deux terminaux mobiles dans le contexte D2D n’ont pas fait l’objet d’études. Aussi, nous proposons un nouveau protocole léger d’authentification et de dérivation de clé permettant d’authentifier les terminaux D2D et de dériver les clés nécessaires à la fois pour le cryptage et pour la protection de l'intégrité des données
Recently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lejaha, Retselisitsoe. „SDN based security solutions for multi-tenancy NFV“. Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.

Der volle Inhalt der Quelle
Annotation:
The Internet continues to expand drastically as a result of explosion of mobile devices, content, server virtualization, and advancement of cloud services. This increase has significantly changed traffic patterns within the enterprise data centres. Therefore, advanced technologies are needed to improve traditional network deployments to enable them to handle the changing network patterns. Software defined networks (SDN) and network function virtualisation (NFV) are innovative technologies that enable network flexibility, increase network and service agility, and support service-driven virtual networks using concepts of virtualisation and softwarisation. Collaboration of these two concepts enable cloud operator to offer network-as-a-service (NaaS) to multiple tenants in a data-centre deployment. Despite the benefits brought by these technologies, they also bring along security challenges that need to be addressed and managed to ensure successful deployment and encourage faster adoption in industry. This dissertation proposes security solution based on tenant isolation, network access control (NAC) and network reconfiguration that can be implemented in NFV multi-tenant deployment to guarantee privacy and security of tenant functions. The evaluation of the proof-of-concept framework proves that SDN based tenant isolation solution provides a high level of isolation in a multi-tenant NFV cloud. It also shows that the proposed network reconfiguration greatly reduces chances of an attacker correctly identifying location and IP addresses of tenant functions within the cloud environment. Because of resource limitation, the proposed NAC solution was not evaluated. The efficiency of this solution for multitenancy NFV has been added as part of future work.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Okwuibe, J. (Jude). „Performance evaluation of HIP-based network security solutions“. Master's thesis, University of Oulu, 2015. http://jultika.oulu.fi/Record/nbnfioulu-201510102056.

Der volle Inhalt der Quelle
Annotation:
Abstract. Host Identity Protocol (HIP) is a networking technology that systematically separates the identifier and locator roles of IP addresses and introduces a Host Identity (HI) name space based on a public key security infrastructure. This modification offers a series of benefits such as mobility, multi-homing, end-to-end security, signaling, control/data plane separation, firewall security, e.t.c. Although HIP has not yet been sufficiently applied in mainstream communication networks, industry experts foresee its potential as an integral part of next generation networks. HIP can be used in various HIP-aware applications as well as in traditional IP-address-based applications and networking technologies, taking middle boxes into account. One of such applications is in Virtual Private LAN Service (VPLS), VPLS is a widely used method of providing Ethernet-based Virtual Private Network that supports the connection of geographically separated sites into a single bridged domain over an IP/MPLS network. The popularity of VPLS among commercial and defense organizations underscores the need for robust security features to protect both data and control information. After investigating the different approaches to HIP, a real world testbed is implemented. Two experiment scenarios were evaluated, one is performed on two open source Linux-based HIP implementations (HIPL and OpenHIP) and the other on two sets of enterprise equipment from two different companies (Tempered Networks and Byres Security). To account for a heterogeneous mix of network types, the Open source HIP implementations were evaluated on different network environments, namely Local Area Network (LAN), Wireless LAN (WLAN), and Wide Area Network (WAN). Each scenario is tested and evaluated for performance in terms of throughput, latency, and jitter. The measurement results confirmed the assumption that no single solution is optimal in all considered aspects and scenarios. For instance, in the open source implementations, the performance penalty of security on TCP throughput for WLAN scenario is less in HIPL than in OpenHIP, while for WAN scenario the reverse is the case. A similar outcome is observed for the UDP throughput. However, on latency, HIPL showed lower latency for all three network test scenarios. For the legacy equipment experiment, the penalty of security on TCP throughput is about 19% compared with the non-secure scenario while latency is increased by about 87%. This work therefore provides viable information for researchers and decision makers on the optimal solution to securing their VPNs based on the application scenarios and the potential performance penalties that come with each approach.HIP-pohjaisten tietoliikenneverkkojen turvallisuusratkaisujen suorituskyvyn arviointi. Tiivistelmä. Koneen identiteettiprotokolla (HIP, Host Identity Protocol) on tietoliikenneverkkoteknologia, joka käyttää erillistä kerrosta kuljetusprotokollan ja Internet-protokollan (IP) välissä TCP/IP-protokollapinossa. HIP erottaa systemaattisesti IP-osoitteen verkko- ja laite-osat, sekä käyttää koneen identiteetti (HI) -osaa perustuen julkisen avainnuksen turvallisuusrakenteeseen. Tämän hyötyjä ovat esimerkiksi mobiliteetti, moniliittyminen, päästä päähän (end-to-end) turvallisuus, kontrolli-informaation ja datan erottelu, kohtaaminen, osoitteenmuutos sekä palomuurin turvallisuus. Teollisuudessa HIP-protokolla nähdään osana seuraavan sukupolven tietoliikenneverkkoja, vaikka se ei vielä olekaan yleistynyt laajaan kaupalliseen käyttöön. HIP–protokollaa voidaan käyttää paitsi erilaisissa HIP-tietoisissa, myös perinteisissä IP-osoitteeseen perustuvissa sovelluksissa ja verkkoteknologioissa. Eräs tällainen sovellus on virtuaalinen LAN-erillisverkko (VPLS), joka on laajasti käytössä oleva menetelmä Ethernet-pohjaisen, erillisten yksikköjen ja yhden sillan välistä yhteyttä tukevan, virtuaalisen erillisverkon luomiseen IP/MPLS-verkon yli. VPLS:n yleisyys sekä kaupallisissa- että puolustusorganisaatioissa korostaa vastustuskykyisten turvallisuusominaisuuksien tarpeellisuutta tiedon ja kontrolliinformaation suojauksessa. Tässä työssä tutkitaan aluksi HIP-protokollan erilaisia lähestymistapoja. Teoreettisen tarkastelun jälkeen käytännön testejä suoritetaan itse rakennetulla testipenkillä. Tarkasteltavat skenaariot ovat verrata Linux-pohjaisia avoimen lähdekoodin HIP-implementaatioita (HIPL ja OpenHIP) sekä verrata kahden eri valmistajan laitteita (Tempered Networks ja Byres Security). HIP-implementaatiot arvioidaan eri verkkoympäristöissä, jota ovat LAN, WLAN sekä WAN. Kaikki testatut tapaukset arvioidaan tiedonsiirtonopeuden, sen vaihtelun (jitter) sekä latenssin perusteella. Mittaustulokset osoittavat, että sama ratkaisu ei ole optimaalinen kaikissa tarkastelluissa tapauksissa. Esimerkiksi WLAN-verkkoa käytettäessä turvallisuuden aiheuttama häviö tiedonsiirtonopeudessa on HIPL:n tapauksessa OpenHIP:iä pirnempi, kun taas WAN-verkon tapauksessa tilanne on toisinpäin. Samanlaista käyttäytymistä havaitaan myös UDP-tiedonsiirtonopeudessa. HIPL antaa kuitenkin pienimmän latenssin kaikissa testiskenaarioissa. Eri valmistajien laitteita vertailtaessa huomataan, että TCP-tiedonsiirtonopeus huononee 19 ja latenssi 87 prosenttia verrattuna tapaukseen, jossa turvallisuusratkaisua ei käytetä. Näin ollen tämän työn tuottama tärkeä tieto voi auttaa alan toimijoita optimaalisen verkkoturvallisuusratkaisun löytämisessä VPN-pohjaisiin sovelluksiin.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Security solutions"

1

M, Jackson Keith, Hrsg. Computer security solutions. Boca Raton: CRC Press, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Inc, NetLibrary, Hrsg. Designing security architecture solutions. New York: John Wiley, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Mueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Enterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Mason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Security solutions"

1

Versluis, Gerald, und Steven Thewissen. „Network and Security“. In Xamarin.Forms Solutions, 153–89. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Schreck, Jörg. „Solutions for Security“. In Security and Privacy in User Modeling, 95–156. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Li, Bin, und David Zhang. „Signature Security System for E-Commerce“. In Biometric Solutions, 187–216. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Morton, Adam. „Managing Security and Access Control“. In Mastering Snowflake Solutions, 67–98. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

McDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman und David C. Knox. „Security Packages“. In Mastering Oracle PL/SQL: Practical Solutions, 415–62. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ling, Lee Luan, und Miguel Gustavo Lizárraga. „Biometrics on the Internet: Security Applications and Services“. In Biometric Solutions, 131–67. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

You, Jane, und David Zhang. „Web Guard: A Biometrics Identification System for Network Security“. In Biometric Solutions, 217–41. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ashley, Paul, und Mark Vandenwauver. „Comparison of the Security Solutions“. In Practical Intranet Security, 207–14. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

De Capitani di Vimercati, Sabrina, und Pierangela Samarati. „Data Privacy – Problems and Solutions“. In Information Systems Security, 180–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Barde, Snehlata. „Blockchain-Based Cyber Security“. In Transforming Cybersecurity Solutions using Blockchain, 55–69. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Security solutions"

1

Jasser, Stefanie, und Matthias Riebisch. „Reusing security solutions“. In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Fischer, D., B. Markscheffel und T. Seyffarth. „Smartphone security: Overview of security software solutions“. In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Fischer, D., B. Markscheffel und T. Seyffarth. „Smartphone security: Overview of security software solutions“. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Habbak, Hany, Khaled Metwally und Ahmed Maher Mattar. „Securing Big Data: A Survey on Security Solutions“. In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Adibi, S. „Comparative mobile platforms security solutions“. In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mondol, Joel-Ahmed M. „Cloud security solutions using FPGA“. In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032987.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Suomalainen, Jani, und Pasi Hyttinen. „Security Solutions for Smart Spaces“. In 2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT). IEEE, 2011. http://dx.doi.org/10.1109/saint.2011.57.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Seto, Myron W. L. „Security solutions: strategy and architecture“. In Electronic Imaging 2002, herausgegeben von Rudolf L. van Renesse. SPIE, 2002. http://dx.doi.org/10.1117/12.462723.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Venkatesh, P., und M. S. Tasmiya Taranum. „Network Security: Threats and Solutions“. In Third International Conference on Current Trends in Engineering Science and Technology ICCTEST-2017. Grenze Scientific Society, 2017. http://dx.doi.org/10.21647/icctest/2017/49039.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Steiner, Wilfried. „Candidate security solutions for TTEthernet“. In 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC). IEEE, 2013. http://dx.doi.org/10.1109/dasc.2013.6712579.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Security solutions"

1

Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522104.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pudelek, Jessie, und Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), Mai 2019. http://dx.doi.org/10.2172/1524811.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Schulzrinne, H., E. Marocco und E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, Februar 2010. http://dx.doi.org/10.17487/rfc5765.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gopalan, Sundararajan Srinivasa, Rajesh Bhatia, Sonalini Khetrapal und Sungsup Ra. Addressing Nutrition Security in Urban India through Multisectoral Action. Asian Development Bank, Februar 2022. http://dx.doi.org/10.22617/wps220057-2.

Der volle Inhalt der Quelle
Annotation:
It describes malnutrition’s impact on health and nonhealth sectors, identifies key determinants, and offers specific solutions according to the local contexts in various urban areas. The recommendations go beyond examining the health sector and take into account water supply, sanitation, sociocultural factors, food supply, and other issues affecting urban nutrition in India.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Meijer, Karen, und Katongo Seyuba. The Role of Development Actors in Responding to Environment and Security Links. Stockholm International Peace Research Institute, Dezember 2022. http://dx.doi.org/10.55163/kniz5636.

Der volle Inhalt der Quelle
Annotation:
Despite growing interest among development actors to integrate links between the environment, climate, peace and security into their policies and activities, practical approaches to addressing environment-related security risks are lagging behind awareness at policy level. This policy brief provides insights into how donors can incentivize implementing organizations to further develop and apply these practical approaches. It recommends support that: (a) facilitates engagement between implementing organizations and local communities, and prioritizes local knowledge and solutions; (b) supports new partnerships between implementing organizations from both the environment or climate side and the security or peacebuilding side; (c) enables the sharing of good practices and lessons learned on how to address environment-related security risks at various levels; (d) promotes the inclusion and prioritization of environment– security links in country-level policies; and (e) is more flexible in implementation, as well as engages in long-term commitments and funding.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Giordano, Meredith, Charlotte de Fraiture, Elizabeth Weight und Julie van der Bliek. Water for wealth and food security: supporting farmer-driven investments in agricultural water management. Synthesis report of the AgWater Solutions Project. International Water Management Institute (IWMI)., 2012. http://dx.doi.org/10.5337/2012.207.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ozano, Kim, Andrew Roby und Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), Januar 2022. http://dx.doi.org/10.19088/k4d.2022.026.

Der volle Inhalt der Quelle
Annotation:
The overarching goals for the UK in relation to global water security are to; tackle and reverse growing water insecurity and its consequences caused by depletion and degradation of natural water sources; and address poor water management and increasing demand. To do this, the UK has a well-developed water ‘offer’ that together can help reach the goal of global water security. This note details some of that water offer: UK water leadership: The UK developed the concept of modern sanitation and water supply, with an early example being the Victorian Bazalgette London sewer; Ownership and regulation: The UK has four models of ownership: government department in Northern Ireland, GoCo in Scotland, Mutual in Wales, and private companies in England. But the common thread is strong and clear, regulation to deliver the right outcomes for society; Competition and markets: The UK set up the world’s first water retail markets for business customers, delivering savings and environmental benefits. Similar market mechanisms are being developed for sewage sludge, which will help drive circular economy solutions; Innovation: The UK has a huge number of water tech start-ups and most water companies have labs and pilot schemes to support these fledgling companies. At the same time, the English regulator, Ofwat, has established a huge innovation fund, which along with the Scottish Hydro Nation initiative has made the UK the best place in the world for water innovation and tech.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Artis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow und Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), März 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.

Der volle Inhalt der Quelle
Annotation:
For nearly 100 years, American leadership, regardless of political affiliation, has recognized the vital importance of people-to-people international exchange programs in bolstering our nation’s economy, strengthening our national security, and improving America’s status in the world. In today’s interconnected world, where global challenges require global cooperation on solutions, the United States should not retreat from international engagement, but should rather double our efforts to build positive and mutually supportive connections with our neighbors. America must embrace its role in leading international peace and prosperity by facilitating meaningful, safe, educational exchange in all directions – helping more Americans learn firsthand about other people and cultures and helping more foreign students come to America to experience for themselves the principles upon which our country was built - liberty, democracy, capitalism, and basic human freedom. America can and should leverage international education, exchange and public diplomacy programs to plant seeds of peace, regain the world’s trust, and return to our previous role as a respected leader in global affairs. Leading the effort to bring the world together helps America, Americans, and our vital allies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Black, Richard, Joshua Busby, Geoffrey D. Dabelko, Cedric de Coning, Hafsa Maalim, Claire McAllister, Melvis Ndiloseh et al. Environment of Peace: Security in a New Era of Risk. Stockholm International Peace Research Institute, Mai 2022. http://dx.doi.org/10.55163/lcls7037.

Der volle Inhalt der Quelle
Annotation:
The environmental crisis is increasing risks to security and peace worldwide, notably in countries that are already fragile. Indicators of insecurity such as the number of conflicts, the number of hungry people and military expenditure are rising; so are indicators of environmental decline, in climate change, biodiversity, pollution and other areas. In combination, the security and environmental crises are creating compound, cascading, emergent, systemic and existential risks. Without profound changes of approach by institutions of authority, risks will inevitably proliferate quickly. Environment of Peace surveys the evolving risk landscape and documents a number of developments that indicate a pathway to solutions––in international law and policy, in peacekeeping operations and among non-governmental organizations. It finds that two principal avenues need to be developed: (a) combining peace-building and environmental restoration, and (b) effectively addressing the underlying environmental issues. It also analyses the potential of existing and emerging pro-environment measures for exacerbating risks to peace and security. The findings demonstrate that only just and peaceful transitions to more sustainable practices can be effective––and show that these transitions also need to be rapid.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie