메뉴 건너뛰기




Volumn 53, Issue 4, 2015, Pages 176-186

Virtualized Security at the Network Edge: A User-Centric Approach

(16)  Montero, Diego a   Yannuzzi, Marcelo a   Shaw, Adrian b   Jacquin, Ludovic b   Pastor, Antonio c   Serral Gracià, René a   Lioy, Antonio d   Risso, Fulvio d   Basile, Cataldo d   Sassu, Roberto d   Nemirovsky, Mario f   Ciaccia, Francesco e   Georgiades, Michael g   Charalambides, Savvas g   Kuusijärvi, Jarkko h   Bosco, Francesca i  


Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER GAMES; MOBILE SECURITY; PERSONAL COMPUTERS; VIRTUAL REALITY;

EID: 84927741456     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2015.7081092     Document Type: Article
Times cited : (40)

References (14)
  • 6
    • 78349269398 scopus 로고    scopus 로고
    • Ontology-Based Security Policy Translation
    • C. Basile et al., "Ontology-Based Security Policy Translation," J. Info. Assurance and Security, vol. 5, no. 1, 2010, pp. 437-45.
    • (2010) J. Info. Assurance and Security , vol.5 , Issue.1 , pp. 437-445
    • Basile, C.1
  • 8
    • 84865344402 scopus 로고    scopus 로고
    • Network-Level Access Control Policy Analysis and Transformation
    • C. Basile, A. Cappadonia, and A. Lioy, "Network-Level Access Control Policy Analysis and Transformation," IEEE/ACM Trans. Networking, vol. 20, no. 4, 2012, pp. 985-98.
    • (2012) IEEE/ACM Trans. Networking , vol.20 , Issue.4 , pp. 985-998
    • Basile, C.1    Cappadonia, A.2    Lioy, A.3
  • 9
    • 33750907119 scopus 로고    scopus 로고
    • Methods and Limitations of Security Policy Reconciliation
    • Aug.
    • P. McDaniel and A. Prakash, "Methods and Limitations of Security Policy Reconciliation," ACM Trans. Info. System Security, vol. 9, no. 3, Aug. 2006, pp. 259-91.
    • (2006) ACM Trans. Info. System Security , vol.9 , Issue.3 , pp. 259-291
    • McDaniel, P.1    Prakash, A.2
  • 14
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-based Integrity Measurement Architecture
    • R. Sailer et al., "Design and Implementation of a TCG-based Integrity Measurement Architecture," Proc. 13th Conf. USENIX Security Symp., 2004, pp. 223-38.
    • Proc. 13th Conf. USENIX Security Symp., 2004 , pp. 223-238
    • Sailer, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.