凶猛 发表于 2025-3-23 12:05:35

MOBILE FINANCIAL INFORMATION SERVICES, SECURITY, AND CERTIFICATION,pull and push services and also determine the security requirements of such services comparing them with what current technology has to offer. It shows that none of the technologies used today is able to provide the support for all the stated security requirements and that at least three areas would profit from certification.

amplitude 发表于 2025-3-23 15:40:56

H/W BASED FIREWALL FOR HIGH-PERFORMANCE NETWORK SECURITY,opnotch security. For satisfying those requirements, we have developed hardware based and high performance Security Gateway System (SGS) which providing security functions such Firewall, IDS, Rate-limiting, and Traffic metering in wire speed. In this paper, we especially describe how H/W based Firewall features are implemented in SGS.

刺穿 发表于 2025-3-23 19:30:14

Conference proceedings 2005n and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France.  Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizat

CLAIM 发表于 2025-3-23 23:30:28

Conference proceedings 2005grity of the involved computer-based systems is maintained...This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities..

incite 发表于 2025-3-24 03:07:04

PROBLEMS RUNNING UNTRUSTED SERVICES AS JAVA THREADS,mines the risks associated with Java threads that run untrusted code and presents existing research solutions. Requirements for a secure execution environment are presented. The requirements are contrasted by recommendations and problems when using Java threads for running untrusted code.

Offset 发表于 2025-3-24 08:07:03

BUSINESS RISK MANAGEMENT BASED ON A SERVICE PORTFOLIO APPROACH FOR AN EQUIPMENT-PROVIDING SERVICE,e profitable, though, the supplier must be able to accurately determine the appropriate risk and measure how much of this risk it is accepting instead of the user. It is critical that the equipment provider have an effective means to control the risk and understand its potential negative effect.

infelicitous 发表于 2025-3-24 11:41:28

http://reply.papertrans.cn/23/2234/223349/223349_17.png

annexation 发表于 2025-3-24 14:58:06

1868-4238 lts and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities..978-1-4614-9809-4978-0-387-25088-5Series ISSN 1868-4238 Series E-ISSN 1868-422X

Infantry 发表于 2025-3-24 19:22:23

http://reply.papertrans.cn/23/2234/223349/223349_19.png

Graphite 发表于 2025-3-25 01:55:33

GENERATING NETWORK SECURITY PROTOCOL IMPLEMENTATIONS FROM FORMAL SPECIFICATIONS, discussed, particularly its support for pluggable implementation providers. Spi2Java‘s functionality is demonstrated by way of example: we specify the Needham-Schroeder Public Key Authentication Protocol, and Lowe‘s attack on it, in the Spi Calculus and examine a successful attack run using Spi2Jav
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Certification and Security in Inter-Organizational E-Services; IFIP 18th World Comp Enrico Nardelli,Maurizio Talamo Conference proceedings