Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Domain Based Security

Known as: Domain-based security 
"Domain Based Security", abbreviated to "DBSy", is a model-based approach to help analyse information security risks in a business context and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper proposes security enhancement algorithms for transformer differential protection, which claims to augment the unit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2015
2015
Domain Based Security (DBSy) is a model-based approach, developed by the Defence Evaluation and Research Agency for the UK… Expand
  • figure 2
  • figure 1
  • table I
  • figure 3
  • figure 5
2012
2012
In Mobile agent system, security issues are a major problem. Mobile agents are autonomous software entity when a mobile agent… Expand
2011
2011
Cloud computing has drawn much attention in recent years. One of its service models, called infrastructure as a service (IaaS… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2010
2010
Cloud computing has drawn much attention in recent years. One of its delivery models, called infrastructure as a service (IaaS… Expand
  • figure I
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2006
2006
Developments in network technology are enabling organisations to form temporary alliances to achieve specific goals. Such… Expand
  • figure 1
2005
2005
DBSy (Domain Based Security) is being used more and more for the identification, analysis and documentation of security issues in… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2005
Highly Cited
2005
This paper introduces a trust-domain based security architecture for mobile ad-hoc networks (MANETs). The aim of this… Expand
  • figure 1
2002
2002
The agent programming approach can be beneficial for many new applications on the World Wide Web. We propose a novel agent… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4