Articles with "security architecture" as a keyword



Photo from wikipedia

On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2016.2535320

Abstract: In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates… read more here.

Keywords: integrated security; implementation; security; security architecture ... See more keywords
Photo from wikipedia

African peace and security architecture in the context of African solutions to African problems

Sign Up to like & get
recommendations!
Published in 2020 at "African Renaissance"

DOI: 10.31920/2516-5305/2020/17n4a2

Abstract: The African Peace and Security Architecture (APSA) is the umbrella term for the key African Union (AU) mechanisms for promoting peace, security and stability on the continent. More specifically, it is “an operational structure for… read more here.

Keywords: african solutions; security architecture; peace security; african peace ... See more keywords
Photo by joakimnadell from unsplash

A Robust Security Architecture for SDN-Based 5G Networks

Sign Up to like & get
recommendations!
Published in 2019 at "Future Internet"

DOI: 10.3390/fi11040085

Abstract: 5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications… read more here.

Keywords: security architecture; architecture sdn; sdn; robust security ... See more keywords
Photo from wikipedia

An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata

Sign Up to like & get
recommendations!
Published in 2022 at "PeerJ Computer Science"

DOI: 10.7717/peerj-cs.989

Abstract: The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected… read more here.

Keywords: principles cellular; security; security architecture; iot ... See more keywords