Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2016.2535320
Abstract: In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates…
read more here.
Keywords:
integrated security;
implementation;
security;
security architecture ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "African Renaissance"
DOI: 10.31920/2516-5305/2020/17n4a2
Abstract: The African Peace and Security Architecture (APSA) is the umbrella term for the key African Union (AU) mechanisms for promoting peace, security and stability on the continent. More specifically, it is “an operational structure for…
read more here.
Keywords:
african solutions;
security architecture;
peace security;
african peace ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Future Internet"
DOI: 10.3390/fi11040085
Abstract: 5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications…
read more here.
Keywords:
security architecture;
architecture sdn;
sdn;
robust security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PeerJ Computer Science"
DOI: 10.7717/peerj-cs.989
Abstract: The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected…
read more here.
Keywords:
principles cellular;
security;
security architecture;
iot ... See more keywords