Academic literature on the topic 'Security-aware application'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security-aware application.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security-aware application"
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer, and Reza Farivar. "Toward Application-Aware Security and Reliability." IEEE Security and Privacy Magazine 5, no. 1 (January 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Full textLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes, and Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers." Electronics 11, no. 23 (November 24, 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Full textDirin, Amir, Teemu H. Laine, and Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 2 (March 29, 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Full textRosendo, Miguel, and Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications." Network 2, no. 1 (January 14, 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Full textArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Full textDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, and Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions." IEEE Transactions on Network and Service Management 17, no. 1 (March 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Full textKhan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (July 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Full textHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li, and Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing." Security and Communication Networks 2021 (May 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Full textAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi, and Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25, no. 01 (March 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Full textSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, and Narendra Joshi. "SQL Injection and Areas of Security Concern." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Full textDissertations / Theses on the topic "Security-aware application"
Preda, Stere. "Reliable context aware security policy deployment - applications to IPv6 environments." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0145.
Full textOrganization networks are continuously growing so as to sustain the newly created organizational requirements and activities. In parallel, concerns for assets protection are also increasing and security management becomes an ever-changing task for the security officer. In this dissertation we address several key aspects of network security management providing solutions for each aspect:1. Policy deployment based on access control models. Invalid or unusable data of the security policy will have been removed before deploying the abstract policy through a set of algorithms; in this manner, the security officer’s tasks are greatly simplified. 2. Formal algorithm development. The correctness of the algorithms involved in the policy deployment process is of undeniable importance. These algorithms should be proved so that the security officers trust the automatic policy deployment process. 3. Management of contextual requirements and of limited security functionalities. The access control model should be robust enough to cover contextual requirements. The issue is that the security devices are not always able to interpret the contexts. And sometimes, there are security requirements which cannot be deployed given the existing limited security functionalities in the IS. 4. New IPv6 security mechanisms. We have naturally come to consider the design of new IPv6 security mechanisms when dealing with the lack of functionalities in an information system. Our research outlines a comprehensive approach to deploy access control security policies. Actually, it constitutes a step further towards an automatic and reliable management of network security
Holford, John William. "The concept of self-defending objects and the development of security aware applications." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16227/1/John_Holford_Thesis.pdf.
Full textHolford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.
Full textNakka, Nithin Manikyam. "Reliability and security engine : a processor-level framework for application-aware detection and recovery /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3242950.
Full textSource: Dissertation Abstracts International, Volume: 67-11, Section: B, page: 6626. Adviser: Ravishanker K. Iyer. Includes bibliographical references (leaves 209-223) Available on microfilm from Pro Quest Information and Learning.
Tatlı, Emin Islam [Verfasser]. "Security in context-aware mobile business applications / vorgelegt von Emin Islam Tatlı." 2009. http://d-nb.info/993514243/34.
Full textBooks on the topic "Security-aware application"
Khan, Khaled M. Security-aware systems applications and software development methods. Hershey, PA: Information Science Reference, 2012.
Find full textIyengar, S. S. (Sundararaja S.) and Phoha Vir V, eds. Introduction to contextual processing: Theory and applications. Boca Raton, FL: Chapman and Hall/CRC, 2011.
Find full textYin, Heng, and Mu Zhang. Android Application Security: A Semantics and Context-Aware Approach. Springer, 2016.
Find full textPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Find full textPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2017.
Find full textPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Find full text(Editor), Thomas Strang, and Claudia Linnhoff-Popien (Editor), eds. Location- and Context-Awareness: First International Workshop, LoCA 2005, Oberpfaffenhofen, Germany, May 12-13, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.
Find full textBook chapters on the topic "Security-aware application"
Pattabiraman, Karthik. "Application-Aware Reliability and Security: The Trusted Illiac Experience." In Springer Series in Reliability Engineering, 207–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02063-6_11.
Full textMann, Zoltán Ádám. "Security- and Privacy-Aware IoT Application Placement and User Assignment." In Computer Security. ESORICS 2021 International Workshops, 296–316. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_18.
Full textHolderer, Julius. "Why the Automation of Regulation Can Obstruct Business Processes." In Obstructions in Security-Aware Business Processes, 1–30. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_1.
Full textBurbank, Jack L., and William T. M. Kasch. "The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 472–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03354-4_36.
Full textTemdee, Punnarumol, and Ramjee Prasad. "Security for Context-Aware Applications." In Context-Aware Communication and Computing: Applications for Smart Environment, 97–125. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59035-6_5.
Full textHernandez, Julio, Lucy McKenna, and Rob Brennan. "TIKD: A Trusted Integrated Knowledge Dataspace for Sensitive Data Sharing and Collaboration." In Data Spaces, 265–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_13.
Full textNair, Srijith K., Bruno Crispo, and Andrew S. Tanenbaum. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture." In Security Protocols, 26–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_5.
Full textNair, Srijith K. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture." In Security Protocols, 32–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_6.
Full textHolderer, Julius. "Towards Intelligent Security- and Process-Aware Information Systems." In Obstructions in Security-Aware Business Processes, 315–22. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_6.
Full textKo, KyoungHee, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, and Hyun Cheol Jeong. "Design and Implementation of SIP-aware Security Management System." In Information Security Applications, 10–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_2.
Full textConference papers on the topic "Security-aware application"
Liu, Kaikai, Navjot Warade, Tejas Pai, and Keertikeya Gupta. "Location-aware smart campus security application." In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2017. http://dx.doi.org/10.1109/uic-atc.2017.8397588.
Full textRocha, Thiago, Eduardo Souto, and Khalil El-Khatib. "Functionality-Based Mobile Application Recommendation System with Security and Privacy Awareness." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19265.
Full textDoriguzzi-Corin, Roberto, Silvio Cretti, Tiziana Catena, Simone Magnani, and Domenico Siracusa. "Towards Application-Aware Provisioning of Security Services with Kubernetes." In 2022 IEEE 8th International Conference on Network Softwarization (NetSoft). IEEE, 2022. http://dx.doi.org/10.1109/netsoft54395.2022.9844023.
Full textXu, Hui, Debao Xiao, and Zheng Wu. "Application of Security Ontology to Context-Aware Alert Analysis." In 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science. IEEE, 2009. http://dx.doi.org/10.1109/icis.2009.199.
Full textIyer, R. K. "Application-Aware Reliability and Security: The Trusted ILLIAC Approach." In 5th IEEE International Symposium on Network Computing and Applications. IEEE, 2006. http://dx.doi.org/10.1109/nca.2006.15.
Full textKarjoth, Günter. "Aligning Security and Business Objectives for Process-Aware Information Systems." In CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2699026.2699028.
Full textWu, Mei-Yu, Chih-Kun Ke, and Wen-Ling Tzeng. "Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.25.
Full textAntonoaie, Cristina. "ASPECTS REGARDING ICT TRUST, SECURITY AND PRIVACY IN EU COUNTRIES." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-156.
Full textMoreira, Rodrigo, Larissa Rodrigues, Pedro Rosa, and Flávio Silva. "Improving the network traffic classification using the Packet Vision approach." In Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13496.
Full textRawat, Sanjay, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. "VUzzer: Application-aware Evolutionary Fuzzing." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/ndss.2017.23404.
Full text