Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,525,293 papers from all fields of science
Search
Sign In
Create Free Account
Open security
Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Android
Information security
Malware
Open Source Vulnerability Database
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Secured Miniaturized System-in-Package Contactless and Passive Authentication Devices Featuring NFC
N. Druml
,
Jürgen Schilling
,
+4 authors
G. Holweg
Euromicro Symposium on Digital Systems Design
2016
Corpus ID: 7837538
2016
2016
SIP Vulnerabilities Testing in Session Establishment & User Registration
Peter Qi Qiu
,
O. Monkewich
,
R. Probert
International Conference on E-Business and…
2016
Corpus ID: 4625468
This paper describes an attack-directed approach to test SIP authentication vulnerabilities in session establishment and user…
Expand
2014
2014
Attacks and Threats on the U-Healthcare Application with Mobile Agent
Jung Tae Kim
2014
Corpus ID: 29048321
Wireless sensor network is widespread used in hospital environment with mobile device such as NFC, RFID tag and small sensor…
Expand
2013
2013
Analysis and control of middleboxes in the internet
Andreas Müller
2013
Corpus ID: 22431811
This thesis studies and develops concepts and algorithms for understanding and improving the behavior of middleboxes, their…
Expand
2012
2012
A Novel Open Security Framework for Cloud Computing
Devki Gaurav Pal
,
R. Krishna
,
P. Srivastava
,
Sushil Kumar
,
Monark Bag
,
Vrijendra Singh
International Conference on Cloud Computing
2012
Corpus ID: 62131127
Article history: Received Apr 24 th , 2012 Revised May 17 th , 2012 Accepted June 01 th , 2012 The evolution of cloud computing…
Expand
2011
2011
Security Issues in a Synchronous e-Training Platform
J. C. Granda
,
Pelayo Nuño
,
D. García
,
F. J. Suárez
Sixth International Conference on Availability…
2011
Corpus ID: 476013
Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. Real…
Expand
2010
2010
Identity federation in cloud computing
V. Casola
,
M. Rak
,
Umberto Villano
Sixth International Conference on Information…
2010
Corpus ID: 14712097
Both cloud and GRID are computing paradigms for the large-scale management of distributed resources. Even if the first is usually…
Expand
2008
2008
Enabling Context-based Cooperation: a Generic Context Model and Management System
C. P. Kunze
,
Sonja Zaplata
,
Mirwais Turjalei
,
W. Lamersdorf
2008
Corpus ID: 11841399
In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments…
Expand
Review
2007
Review
2007
Semiotics of identity management
P. Wisse
2007
Corpus ID: 142686809
2003
2003
MOSES: MPEG OPEN SECURITY FOR EMBEDDED SYSTEMS
P. Kudumakis
2003
Corpus ID: 61236949
MOSES [1] an EC funded project, is intended to build upon the results of previous IST projects acting in the multimedia content…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE