Search

Your search keyword '"Security service"' showing total 185 results

Search Constraints

Start Over You searched for: Descriptor "Security service" Remove constraint Descriptor: "Security service" Publisher springer us Remove constraint Publisher: springer us
185 results on '"Security service"'

Search Results

1. Introduction

13. A Data-Centric Security Analysis Of ICGrid

14. Introduction to Information Security

15. Service Levels, Security, and Trust

16. Automated Assessment Of Compliance With Security Best Practices

17. Competition, Speculative Risks, and IT Security Outsourcing

18. Secure Integrated Circuits and Systems

19. Introduction to e-Healthcare Information Security

20. Modeling the Security Ecosystem - The Dynamics of (In)Security

21. Network Infrastructure Security ’ Switching

22. Introduction to Network Infrastructure Security

23. The Direct Part of the Model – An Information Security Policy Architecture

24. Security for Context-Aware ad-hoc Networking Applications

25. Policies and Security Aspects For Distributed Scientific Laboratories

26. Feasibility of Automated Information Security Compliance Auditing

27. Insecure Flight: Broken Boarding Passes and Ineffective Terrorist Watch Lists

28. An Analysis of Security Services in Grid Storage Systems

29. Mapping Linux Security Targets to Existing Test Suites

30. An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks

31. A Model-based Analysis of Tunability in Privacy Services

32. Security Issues in Wireless Sensor Networks Used in Clinical Information Systems

33. A Research on Issues Related to RFID Security and Privacy

34. A Service-Oriented Approach for Assessing Infrastructure Security

35. Security Strategies for SCADA Networks

36. Basic Security Concepts

37. Security Associations Management (SAM) Model for IP Multimedia System (IMS)

38. Network and System Security

39. Building a Distributed Semantic-aware Security Architecture

40. Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework

41. Improving the Information Security Model by using TFI

42. Critical Infrastructure Protection

43. Security and Privacy

44. Security and Privacy in Dynamic Environments

45. Tool Supported Management of Information Security Culture

46. Security in Mobile Ad-Hoc Networks

47. ERPSEC - A Reference Framework to Enhance Security in ERP Systems

48. A Responsibility Framework for Information Security

49. Assignment of Security Clearances in an Organization

50. Semantics-Aware Perimeter Protection

Catalog

Books, media, physical & digital resources