To search, Click below search items.
All Published Papers Search Service
Title
Comparison of Security Patterns
Author
David G. Rosado, Eduardo Fern?ndez-Medina, Mario Piattini
Vol. 6 No. 2 pp. 139~146
Keywords
Security, Security Patterns, Security Architecture
Analysis of Different Features and the Application of Cisco¡¯s SecureX Architecture in Secure Environment
Ammar Yassir, Smitha Nayak
Vol. 12 No. 9 pp. 1-6
Security, Network Security, cloud computing, SecureX, Security architecture.
A Survey on Security Architecture and Key Management Systems in a Wireless Sensor Network
Sunil Kumar, C. Rama Krishna and A. K. Solanki
Vol. 17 No. 4 pp. 263-273
Cryptography, hash function, pattern generation, symmetric/asymmetric key, data security architecture, key management system.
Multi-Core Embedded Controller Security Architecture with Instruction Stream Detection
Xiaosheng Wang, Yanchun Yang
Vol. 19 No. 5 pp. 147-155
Multi-core embedded controller, security Architecture, Hypervisor, Consolidating control unit, Instruction stream detection