Layered security

Layered security, also known as layered defense, describes the practice of combining multiple mitigating security controls to protect resources and… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2018
05101519882018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This paper presents a Cloud Computing Adoption Framework (CCAF) security suitable for business clouds. CCAF multi-layered… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2013
2013
Many security protocols are built as the composition of an applicationlayer protocol and a secure transport protocol, such as TLS… (More)
  • figure 2.1
  • figure 2.2
  • figure 3.1
  • figure 3.2
  • figure 3.3
Is this relevant?
2011
2011
The increasing complexity of software systems along with expanding connectivity has necessitated the evolution of an integrated… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The Third Generation Partnership Project (3GPP) has been specifying the standards of Long Term Evolution (LTE) for 3G radio… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Existing practical architectural models have been proposed with a hierarchy of layers such as Neumann's 8-layered security model… (More)
  • table 1
Is this relevant?
2006
2006
When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
System security is a key technology to the development and deployment of IT applications and services in a growing global network… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
We investigate the security aspects of wireless local area networks and discuss the weaknesses associated with various… (More)
  • figure 1
Is this relevant?
2003
2003
Designing security-critical systems correctly is very difficult and there are many examples of weaknesses arising in practice. A… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Despite its many practical benefits, mobile agent technology results in significant new security threats from both malicious… (More)
Is this relevant?