Security architecture

Results: 5312



#Item
11

Record-Replay Architecture as a General Security Framework Yasser Shalabi, Mengjia Yan, Nima Honarmand,† Ruby B. Lee,‡ and Josep Torrellas University of Illinois at Urbana-Champaign http:// Brook U

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

- Date: 2017-12-26 19:05:07
    12

    Response to nVisium Audit We enlisted the independent security firm nVisium to audit the design and architecture of the new End-to-End Encryption feature of Day One. We were pleased with the professionalism and thoroughn

    Add to Reading List

    Source URL: dayoneapp.com

    - Date: 2017-06-27 17:01:45
      13

      Nuclear Security Detection Architecture __________________________________________ International Training Course on Nuclear Security Detection Architecture 10 to 14 October 2016 Arusha Tanzania The risk that nuclear or o

      Add to Reading List

      Source URL: taec.or.tz

      - Date: 2016-08-16 09:05:35
        14

        Security As an enterprise-class customer data platform, the security of our clients’ customer data is one of mParticle’s primary objectives. As such, our architecture was built with security at its core. This documen

        Add to Reading List

        Source URL: 463c4n1rj9azl4igm3ijyai3-wpengine.netdna-ssl.com

        - Date: 2016-10-11 12:38:45
          15

          Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

          Add to Reading List

          Source URL: www.cs.columbia.edu

          - Date: 2012-06-11 10:18:08
            16

            New Technology | Architecture and Design | Security | IT | Retail and moremedia schedule

            Add to Reading List

            Source URL: www.ukipme.com

            - Date: 2016-12-09 04:40:17
              17

              Derivation of Domain-specific Architectural Knowledge Views from Governance and Security Compliance Metadata Huy Tran, Ioanna Lytra, Uwe Zdun Software Architecture Research Group University of Vienna, Austria E-Mail: fir

              Add to Reading List

              Source URL: eprints.cs.univie.ac.at

              - Date: 2013-12-19 04:46:07
                18

                Behind the Scenes with iOS Security Black Hat 2016 Ivan Krstić Head of Security Engineering and Architecture, Apple

                Add to Reading List

                Source URL: www.blackhat.com

                - Date: 2016-08-08 16:57:06
                  19

                  Security As an enterprise-class customer data platform, the security of our clients’ customer data is one of mParticle’s primary objectives. As such, our architecture was built with security at its core. This documen

                  Add to Reading List

                  Source URL: 463c4n1rj9azl4igm3ijyai3-wpengine.netdna-ssl.com

                  - Date: 2016-10-11 12:38:45
                    20

                    Whitepaper Egnyte Security Architecture A Comprehensive Approach to Security

                    Add to Reading List

                    Source URL: www.egnyte.com

                    - Date: 2016-06-07 21:04:42
                      UPDATE