Добірка наукової літератури з теми "Security-aware application"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security-aware application".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security-aware application"
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer, and Reza Farivar. "Toward Application-Aware Security and Reliability." IEEE Security and Privacy Magazine 5, no. 1 (January 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Повний текст джерелаLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes, and Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers." Electronics 11, no. 23 (November 24, 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Повний текст джерелаDirin, Amir, Teemu H. Laine, and Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 2 (March 29, 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Повний текст джерелаRosendo, Miguel, and Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications." Network 2, no. 1 (January 14, 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Повний текст джерелаArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Повний текст джерелаDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, and Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions." IEEE Transactions on Network and Service Management 17, no. 1 (March 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Повний текст джерелаKhan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (July 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Повний текст джерелаHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li, and Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing." Security and Communication Networks 2021 (May 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Повний текст джерелаAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi, and Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25, no. 01 (March 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Повний текст джерелаSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, and Narendra Joshi. "SQL Injection and Areas of Security Concern." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Повний текст джерелаДисертації з теми "Security-aware application"
Preda, Stere. "Reliable context aware security policy deployment - applications to IPv6 environments." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0145.
Повний текст джерелаOrganization networks are continuously growing so as to sustain the newly created organizational requirements and activities. In parallel, concerns for assets protection are also increasing and security management becomes an ever-changing task for the security officer. In this dissertation we address several key aspects of network security management providing solutions for each aspect:1. Policy deployment based on access control models. Invalid or unusable data of the security policy will have been removed before deploying the abstract policy through a set of algorithms; in this manner, the security officer’s tasks are greatly simplified. 2. Formal algorithm development. The correctness of the algorithms involved in the policy deployment process is of undeniable importance. These algorithms should be proved so that the security officers trust the automatic policy deployment process. 3. Management of contextual requirements and of limited security functionalities. The access control model should be robust enough to cover contextual requirements. The issue is that the security devices are not always able to interpret the contexts. And sometimes, there are security requirements which cannot be deployed given the existing limited security functionalities in the IS. 4. New IPv6 security mechanisms. We have naturally come to consider the design of new IPv6 security mechanisms when dealing with the lack of functionalities in an information system. Our research outlines a comprehensive approach to deploy access control security policies. Actually, it constitutes a step further towards an automatic and reliable management of network security
Holford, John William. "The concept of self-defending objects and the development of security aware applications." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16227/1/John_Holford_Thesis.pdf.
Повний текст джерелаHolford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.
Повний текст джерелаNakka, Nithin Manikyam. "Reliability and security engine : a processor-level framework for application-aware detection and recovery /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3242950.
Повний текст джерелаSource: Dissertation Abstracts International, Volume: 67-11, Section: B, page: 6626. Adviser: Ravishanker K. Iyer. Includes bibliographical references (leaves 209-223) Available on microfilm from Pro Quest Information and Learning.
Tatlı, Emin Islam [Verfasser]. "Security in context-aware mobile business applications / vorgelegt von Emin Islam Tatlı." 2009. http://d-nb.info/993514243/34.
Повний текст джерелаКниги з теми "Security-aware application"
Khan, Khaled M. Security-aware systems applications and software development methods. Hershey, PA: Information Science Reference, 2012.
Знайти повний текст джерелаIyengar, S. S. (Sundararaja S.) and Phoha Vir V, eds. Introduction to contextual processing: Theory and applications. Boca Raton, FL: Chapman and Hall/CRC, 2011.
Знайти повний текст джерелаYin, Heng, and Mu Zhang. Android Application Security: A Semantics and Context-Aware Approach. Springer, 2016.
Знайти повний текст джерелаPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2017.
Знайти повний текст джерелаPhoha, Vir V., S. Sitharama Iyengar, and Gregory Vert. Introduction to Contextual Processing: Theory and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерела(Editor), Thomas Strang, and Claudia Linnhoff-Popien (Editor), eds. Location- and Context-Awareness: First International Workshop, LoCA 2005, Oberpfaffenhofen, Germany, May 12-13, 2005, Proceedings (Lecture Notes in Computer Science). Springer, 2005.
Знайти повний текст джерелаЧастини книг з теми "Security-aware application"
Pattabiraman, Karthik. "Application-Aware Reliability and Security: The Trusted Illiac Experience." In Springer Series in Reliability Engineering, 207–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02063-6_11.
Повний текст джерелаMann, Zoltán Ádám. "Security- and Privacy-Aware IoT Application Placement and User Assignment." In Computer Security. ESORICS 2021 International Workshops, 296–316. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_18.
Повний текст джерелаHolderer, Julius. "Why the Automation of Regulation Can Obstruct Business Processes." In Obstructions in Security-Aware Business Processes, 1–30. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_1.
Повний текст джерелаBurbank, Jack L., and William T. M. Kasch. "The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 472–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03354-4_36.
Повний текст джерелаTemdee, Punnarumol, and Ramjee Prasad. "Security for Context-Aware Applications." In Context-Aware Communication and Computing: Applications for Smart Environment, 97–125. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59035-6_5.
Повний текст джерелаHernandez, Julio, Lucy McKenna, and Rob Brennan. "TIKD: A Trusted Integrated Knowledge Dataspace for Sensitive Data Sharing and Collaboration." In Data Spaces, 265–91. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_13.
Повний текст джерелаNair, Srijith K., Bruno Crispo, and Andrew S. Tanenbaum. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture." In Security Protocols, 26–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_5.
Повний текст джерелаNair, Srijith K. "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture." In Security Protocols, 32–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_6.
Повний текст джерелаHolderer, Julius. "Towards Intelligent Security- and Process-Aware Information Systems." In Obstructions in Security-Aware Business Processes, 315–22. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-38154-7_6.
Повний текст джерелаKo, KyoungHee, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, and Hyun Cheol Jeong. "Design and Implementation of SIP-aware Security Management System." In Information Security Applications, 10–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_2.
Повний текст джерелаТези доповідей конференцій з теми "Security-aware application"
Liu, Kaikai, Navjot Warade, Tejas Pai, and Keertikeya Gupta. "Location-aware smart campus security application." In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2017. http://dx.doi.org/10.1109/uic-atc.2017.8397588.
Повний текст джерелаRocha, Thiago, Eduardo Souto, and Khalil El-Khatib. "Functionality-Based Mobile Application Recommendation System with Security and Privacy Awareness." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19265.
Повний текст джерелаDoriguzzi-Corin, Roberto, Silvio Cretti, Tiziana Catena, Simone Magnani, and Domenico Siracusa. "Towards Application-Aware Provisioning of Security Services with Kubernetes." In 2022 IEEE 8th International Conference on Network Softwarization (NetSoft). IEEE, 2022. http://dx.doi.org/10.1109/netsoft54395.2022.9844023.
Повний текст джерелаXu, Hui, Debao Xiao, and Zheng Wu. "Application of Security Ontology to Context-Aware Alert Analysis." In 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science. IEEE, 2009. http://dx.doi.org/10.1109/icis.2009.199.
Повний текст джерелаIyer, R. K. "Application-Aware Reliability and Security: The Trusted ILLIAC Approach." In 5th IEEE International Symposium on Network Computing and Applications. IEEE, 2006. http://dx.doi.org/10.1109/nca.2006.15.
Повний текст джерелаKarjoth, Günter. "Aligning Security and Business Objectives for Process-Aware Information Systems." In CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2699026.2699028.
Повний текст джерелаWu, Mei-Yu, Chih-Kun Ke, and Wen-Ling Tzeng. "Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.25.
Повний текст джерелаAntonoaie, Cristina. "ASPECTS REGARDING ICT TRUST, SECURITY AND PRIVACY IN EU COUNTRIES." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-156.
Повний текст джерелаMoreira, Rodrigo, Larissa Rodrigues, Pedro Rosa, and Flávio Silva. "Improving the network traffic classification using the Packet Vision approach." In Workshop de Visão Computacional. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/wvc.2020.13496.
Повний текст джерелаRawat, Sanjay, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. "VUzzer: Application-aware Evolutionary Fuzzing." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2017. http://dx.doi.org/10.14722/ndss.2017.23404.
Повний текст джерела