Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,651,331 papers from all fields of science
Search
Sign In
Create Free Account
Open security
Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Android
Information security
Malware
Open Source Vulnerability Database
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An Introduction of History
Sumanta K Ghosh
2019
Corpus ID: 214317754
History is an enquiry about the actions of human being that have done in the past. The subject matter of history is not the past…
Expand
2016
2016
Secured Miniaturized System-in-Package Contactless and Passive Authentication Devices Featuring NFC
N. Druml
,
Jürgen Schilling
,
+4 authors
G. Holweg
Euromicro Symposium on Digital Systems Design
2016
Corpus ID: 7837538
2012
2012
A Novel Open Security Framework for Cloud Computing
Devki Gaurav Pal
,
R. Krishna
,
P. Srivastava
,
Sushil Kumar
,
Monark Bag
,
Vrijendra Singh
International Conference on Cloud Computing
2012
Corpus ID: 62131127
Article history: Received Apr 24 th , 2012 Revised May 17 th , 2012 Accepted June 01 th , 2012 The evolution of cloud computing…
Expand
2011
2011
Security Issues in a Synchronous e-Training Platform
J. C. Granda
,
Pelayo Nuño
,
D. García
,
F. J. Suárez
Sixth International Conference on Availability…
2011
Corpus ID: 476013
Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. Real…
Expand
2010
2010
Identity federation in cloud computing
V. Casola
,
M. Rak
,
Umberto Villano
Sixth International Conference on Information…
2010
Corpus ID: 14712097
Both cloud and GRID are computing paradigms for the large-scale management of distributed resources. Even if the first is usually…
Expand
2008
2008
Enabling Context-based Cooperation: a Generic Context Model and Management System
C. P. Kunze
,
Sonja Zaplata
,
Mirwais Turjalei
,
W. Lamersdorf
2008
Corpus ID: 11841399
In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments…
Expand
Review
2007
Review
2007
Semiotics of identity management
P. Wisse
2007
Corpus ID: 142686809
2006
2006
Smart Dust Security - Key Infection Revisited
Daniel Cvrcek
,
P. Švenda
International Workshop on Security and Trust…
2006
Corpus ID: 5503529
2003
2003
Taming "Trusted Platforms" by Operating System Design
A. Sadeghi
,
Christian Stüble
Web Information System and Application Conference
2003
Corpus ID: 18918815
Experiences of the past have shown that common computing platforms lack security due to architectural problems and complexity. In…
Expand
1993
1993
The Open Security Architecture
Fredric B. Gluck
Information Management & Computer Security
1993
Corpus ID: 22099745
Outlines the Open Security Architecture (OSA). OSA is an architecture which will provide the basis for the selection, design and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE