Threat model

Results: 162



#Item
101It’s Time for Application-Centric Security Position paper by Irdeto Jan 20, 2014 Abstract Existing security models are inadequate to address emerging web threat models, such as massive surveillance and ever

It’s Time for Application-Centric Security Position paper by Irdeto Jan 20, 2014 Abstract Existing security models are inadequate to address emerging web threat models, such as massive surveillance and ever

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
102draft-trammell-perpass-ppa-01 - A Threat Model for Pervasive Passive Surveillance

draft-trammell-perpass-ppa-01 - A Threat Model for Pervasive Passive Surveillance

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
103draft-barnes-pervasive-problem-00 - Pervasive Attack: A Threat Model and Problem Statement

draft-barnes-pervasive-problem-00 - Pervasive Attack: A Threat Model and Problem Statement

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
104Outline for INR Annual Threat Assessment

Outline for INR Annual Threat Assessment

Add to Reading List

Source URL: www.investigativeproject.org

Language: English - Date: 2007-07-22 08:31:14
105Microsoft Word - TAP_white_paper_Pubrelease082005 _2_.doc

Microsoft Word - TAP_white_paper_Pubrelease082005 _2_.doc

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:32:55
106Securing our Survival (SOS) The Case for a Nuclear Weapons Convention The Updated Model Convention on the Prohibition of the Development, Testing, Production, Stockpiling, Transfer, Use and Threat of Use of Nuclear Weapo

Securing our Survival (SOS) The Case for a Nuclear Weapons Convention The Updated Model Convention on the Prohibition of the Development, Testing, Production, Stockpiling, Transfer, Use and Threat of Use of Nuclear Weapo

Add to Reading List

Source URL: www.disarmsecure.org

Language: English - Date: 2013-04-14 23:45:02
107ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES  Using Concept Maps to Introduce Software Security Assurance Cases

ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Using Concept Maps to Introduce Software Security Assurance Cases

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-09-01 19:29:33
108Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
109White Paper  Addressing the Full Attack Continuum: Before, During, and After an Attack It’s Time for a New Security Model Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that

White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It’s Time for a New Security Model Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that

Add to Reading List

Source URL: www.cisco.com

Language: English
110CGI Centre for Testing and Quality Overview

CGI Centre for Testing and Quality Overview

Add to Reading List

Source URL: www.cgi.com

Language: English - Date: 2013-01-08 13:29:29