Security Metrics
Mostrando 1-6 de 6 artigos, teses e dissertações.
-
1. Consulta a base de dados cifrada em computação nas nuvens
With the dissemination and popularization of the Internet, more and more people and businesses are using cloud computing services. Among these services, there is a storage and hosting of databases in the clouds. In this context a problem arises, how to ensure the privacy and integrity of databases that are exposed to attacks. The goal of this dissertation is
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 08/08/2011
-
2. A CONCEITUAL MODEL FOR ESPECIFICATION FOR SECURITY RISK MANAGEMENT OF INFORMATION SYSTEMS / UM MODELO CONCEITUAL PARA ESPECIFICAÇÃO DA GESTÃO DE RISCOS DE SEGURANÇA EM SISTEMAS DE INFORMAÇÃO
The lack of an alignment among concepts that involve security risk management has caused the stalemate in the adoption of security risks management models for organizations. There are several standards and risk management methodologies, having a large set of concepts, defined in many ways. In order to get an alignment of concepts and establish a suitable voc
Publicado em: 2010
-
3. Aplicação de metricas a analise de segurança em redes metropolitanas de acesso aberto / Metrics application in metropolitan broadband access network security analysis
As questões relacionadas à garantia de segurança influenciam diretamente o sucesso da implantação de redes metropolitanas de acesso aberto. Dessa forma, são necessários métodos eficientes para analisar a segurança destas redes em todos os níveis (organizacional, físico e de sistemas), a fim de propor soluções e implementar melhorias. Nossa propo
Publicado em: 2009
-
4. MÉTRICAS DE SEGURANÇA DE SOFTWARE / SOFTWARE SECURITY METRICS
Today`s growing dependency on information technology (IT) makes software security a key element of IT services. In recent years public and private institutions raised the investment on information security, however the number of attacks is growing faster than our power to face them, putting at risk intellectual property, customer`s confidence and businesses
Publicado em: 2007
-
5. Arquiteturas Cross-layer para Redes de Sensores sem Fio
The majority of proposed communications protocols in sensor networks thrive on the collaborative nature of sensor nodes to optimize a number of important operational aspects such as routing, energy consumption, load balancing and traffic optimization. Common to all the proposed solutions are the fact of these networks also are projected on the traditional la
Publicado em: 2007
-
6. PIPS: Um sistema proativo de prevenÃÃo contra intrusÃes
Protecting a computer system involves a set of security procedures followed by continuous monitoring. Intrusion Detection Systems (IDS) have historically been used to monitor computer networks against threats. Recently the IDSâs have evolved to allow real-time protection against attacks and have been marketed as Intrusion Prevention Systems (IPS). These sys
Publicado em: 2005