All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Open security
Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1993-2018
0
5
10
1993
2018
Related topics
Related topics
9 relations
Android
Information security
Malware
Open Source Vulnerability Database
(More)
Broader (1)
Computer security
Related mentions per year
Related mentions per year
1940-2018
1940
1960
1980
2000
2020
Open security
Malware
Android
Computer security
Information security
Wikipedia
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich
,
Marcin Wójcik
INTRUST
2012
An increasing number of embedded security applications— which traditionally have been heavily reliant on secret and/or…Â
(More)
Is this relevant?
2010
2010
Open Security Issues in German Healthcare Telematics
Ali Sunyaev
,
Jan Marco Leimeister
,
Helmut Krcmar
HEALTHINF
2010
Developments in German healthcare telematics aim at connecting existing information systems of various service providers and…Â
(More)
Is this relevant?
2010
2010
WiMAX Network Security plan - open target for new implementations
Catalin-Teodor Dogaru
2010 8th International Conference on…
2010
Network Security represents a continuously moving target, which has to be reached in order to assure the desired level of…Â
(More)
Is this relevant?
2006
2006
Wireless networking security: open issues in trust, management, interoperation and measurement
Joseph B. Evans
,
Weichao Wang
,
Benjamin J. Ewy
IJSN
2006
The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites…Â
(More)
Is this relevant?
2006
2006
Smart Dust Security - Key Infection Revisited
Daniel Cvrcek
,
Petr Svenda
Electr. Notes Theor. Comput. Sci.
2006
Sensor network is a notion denoting an interesting subset of self-organising wireless networks. These networks are rather dense…Â
(More)
Is this relevant?
2005
2005
Web Service-based ERP Systems and an Open Security Model
Nico Brehm
,
Jorge Marx Gómez
,
Claus Rautenstrauch
2005
Modern enterprise resource planning (ERP) systems like SAP R/3 or Oracle Applications consist of many software components which…Â
(More)
Is this relevant?
2002
2002
ROSA: Realistic Open Security Architecture for Active Networks
Marcelo Bagnulo
,
Bernardo Alarcos
,
MarÃa Calderón
,
Marifeli Sedano
IWAN
2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among…Â
(More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
Tatsuaki Okamoto
,
David Pointcheval
Public Key Cryptography
2001
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class…Â
(More)
Is this relevant?
2001
2001
The Policy Machine for Security Policy Management
Vincent C. Hu
,
Deborah A. Frincke
,
David F. Ferraiolo
International Conference on Computational Science
2001
Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access…Â
(More)
Is this relevant?
1998
1998
Security Services in an Open Service Environment
Reiner Sailer
ACSAC
1998
nels in the future. Furthermore, teleservices process more Emerging telecommunication services use, store, or transmit sensitive…Â
(More)
Is this relevant?