Literatura académica sobre el tema "Security-aware application"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security-aware application".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Security-aware application"
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer y Reza Farivar. "Toward Application-Aware Security and Reliability". IEEE Security and Privacy Magazine 5, n.º 1 (enero de 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Texto completoLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes y Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers". Electronics 11, n.º 23 (24 de noviembre de 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Texto completoDirin, Amir, Teemu H. Laine y Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists". International Journal of Interactive Mobile Technologies (iJIM) 12, n.º 2 (29 de marzo de 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Texto completoRosendo, Miguel y Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications". Network 2, n.º 1 (14 de enero de 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Texto completoArudkar, Archna y Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, n.º 1 (27 de noviembre de 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Texto completoDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi y Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions". IEEE Transactions on Network and Service Management 17, n.º 1 (marzo de 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Texto completoKhan, M. Fahim Ferdous y Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing". International Journal of Adaptive, Resilient and Autonomic Systems 5, n.º 3 (julio de 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Texto completoHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li y Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing". Security and Communication Networks 2021 (25 de mayo de 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Texto completoAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi y Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming". International Journal of Cooperative Information Systems 25, n.º 01 (marzo de 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Texto completoSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia y Narendra Joshi. "SQL Injection and Areas of Security Concern". International Journal of Computer Science and Mobile Computing 10, n.º 5 (30 de mayo de 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Texto completoTesis sobre el tema "Security-aware application"
Preda, Stere. "Reliable context aware security policy deployment - applications to IPv6 environments". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0145.
Texto completoOrganization networks are continuously growing so as to sustain the newly created organizational requirements and activities. In parallel, concerns for assets protection are also increasing and security management becomes an ever-changing task for the security officer. In this dissertation we address several key aspects of network security management providing solutions for each aspect:1. Policy deployment based on access control models. Invalid or unusable data of the security policy will have been removed before deploying the abstract policy through a set of algorithms; in this manner, the security officer’s tasks are greatly simplified. 2. Formal algorithm development. The correctness of the algorithms involved in the policy deployment process is of undeniable importance. These algorithms should be proved so that the security officers trust the automatic policy deployment process. 3. Management of contextual requirements and of limited security functionalities. The access control model should be robust enough to cover contextual requirements. The issue is that the security devices are not always able to interpret the contexts. And sometimes, there are security requirements which cannot be deployed given the existing limited security functionalities in the IS. 4. New IPv6 security mechanisms. We have naturally come to consider the design of new IPv6 security mechanisms when dealing with the lack of functionalities in an information system. Our research outlines a comprehensive approach to deploy access control security policies. Actually, it constitutes a step further towards an automatic and reliable management of network security
Holford, John William. "The concept of self-defending objects and the development of security aware applications". Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16227/1/John_Holford_Thesis.pdf.
Texto completoHolford, John William. "The concept of self-defending objects and the development of security aware applications". Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.
Texto completoNakka, Nithin Manikyam. "Reliability and security engine : a processor-level framework for application-aware detection and recovery /". 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3242950.
Texto completoSource: Dissertation Abstracts International, Volume: 67-11, Section: B, page: 6626. Adviser: Ravishanker K. Iyer. Includes bibliographical references (leaves 209-223) Available on microfilm from Pro Quest Information and Learning.
Tatlı, Emin Islam [Verfasser]. "Security in context-aware mobile business applications / vorgelegt von Emin Islam Tatlı". 2009. http://d-nb.info/993514243/34.
Texto completoLibros sobre el tema "Security-aware application"
Khan, Khaled M. Security-aware systems applications and software development methods. Hershey, PA: Information Science Reference, 2012.
Buscar texto completoIyengar, S. S. (Sundararaja S.) y Phoha Vir V, eds. Introduction to contextual processing: Theory and applications. Boca Raton, FL: Chapman and Hall/CRC, 2011.
Buscar texto completoYin, Heng y Mu Zhang. Android Application Security: A Semantics and Context-Aware Approach. Springer, 2016.
Buscar texto completoPhoha, Vir V., S. Sitharama Iyengar y Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Buscar texto completoPhoha, Vir V., S. Sitharama Iyengar y Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2017.
Buscar texto completoPhoha, Vir V., S. Sitharama Iyengar y Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Buscar texto completo(Editor), Thomas Strang y Claudia Linnhoff-Popien (Editor), eds. Location- and Context-Awareness: First International Workshop, LoCA 2005, Oberpfaffenhofen, Germany, May 12-13, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.
Buscar texto completoCapítulos de libros sobre el tema "Security-aware application"
Pattabiraman, Karthik. "Application-Aware Reliability and Security: The Trusted Illiac Experience". En Springer Series in Reliability Engineering, 207–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02063-6_11.
Texto completoMann, Zoltán Ádám. "Security- and Privacy-Aware IoT Application Placement and User Assignment". En Computer Security. ESORICS 2021 International Workshops, 296–316. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_18.
Texto completoHolderer, Julius. "Why the Automation of Regulation Can Obstruct Business Processes". En Obstructions in Security-Aware Business Processes, 1–30. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_1.
Texto completoBurbank, Jack L. y William T. M. Kasch. "The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 472–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03354-4_36.
Texto completoTemdee, Punnarumol y Ramjee Prasad. "Security for Context-Aware Applications". En Context-Aware Communication and Computing: Applications for Smart Environment, 97–125. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59035-6_5.
Texto completoHernandez, Julio, Lucy McKenna y Rob Brennan. "TIKD: A Trusted Integrated Knowledge Dataspace for Sensitive Data Sharing and Collaboration". En Data Spaces, 265–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_13.
Texto completoNair, Srijith K., Bruno Crispo y Andrew S. Tanenbaum. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture". En Security Protocols, 26–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_5.
Texto completoNair, Srijith K. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture". En Security Protocols, 32–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_6.
Texto completoHolderer, Julius. "Towards Intelligent Security- and Process-Aware Information Systems". En Obstructions in Security-Aware Business Processes, 315–22. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_6.
Texto completoKo, KyoungHee, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha y Hyun Cheol Jeong. "Design and Implementation of SIP-aware Security Management System". En Information Security Applications, 10–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_2.
Texto completoActas de conferencias sobre el tema "Security-aware application"
Liu, Kaikai, Navjot Warade, Tejas Pai y Keertikeya Gupta. "Location-aware smart campus security application". En 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2017. http://dx.doi.org/10.1109/uic-atc.2017.8397588.
Texto completoRocha, Thiago, Eduardo Souto y Khalil El-Khatib. "Functionality-Based Mobile Application Recommendation System with Security and Privacy Awareness". En Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19265.
Texto completoDoriguzzi-Corin, Roberto, Silvio Cretti, Tiziana Catena, Simone Magnani y Domenico Siracusa. "Towards Application-Aware Provisioning of Security Services with Kubernetes". En 2022 IEEE 8th International Conference on Network Softwarization (NetSoft). IEEE, 2022. http://dx.doi.org/10.1109/netsoft54395.2022.9844023.
Texto completoXu, Hui, Debao Xiao y Zheng Wu. "Application of Security Ontology to Context-Aware Alert Analysis". En 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science. IEEE, 2009. http://dx.doi.org/10.1109/icis.2009.199.
Texto completoIyer, R. K. "Application-Aware Reliability and Security: The Trusted ILLIAC Approach". En 5th IEEE International Symposium on Network Computing and Applications. IEEE, 2006. http://dx.doi.org/10.1109/nca.2006.15.
Texto completoKarjoth, Günter. "Aligning Security and Business Objectives for Process-Aware Information Systems". En CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2699026.2699028.
Texto completoWu, Mei-Yu, Chih-Kun Ke y Wen-Ling Tzeng. "Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business". En 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.25.
Texto completoAntonoaie, Cristina. "ASPECTS REGARDING ICT TRUST, SECURITY AND PRIVACY IN EU COUNTRIES". En eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-156.
Texto completoMoreira, Rodrigo, Larissa Rodrigues, Pedro Rosa y Flávio Silva. "Improving the network traffic classification using the Packet Vision approach". En Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13496.
Texto completoRawat, Sanjay, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida y Herbert Bos. "VUzzer: Application-aware Evolutionary Fuzzing". En Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/ndss.2017.23404.
Texto completo