Open security

Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1993-2018
051019932018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
An increasing number of embedded security applications— which traditionally have been heavily reliant on secret and/or… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Developments in German healthcare telematics aim at connecting existing information systems of various service providers and… (More)
  • figure 1
Is this relevant?
2010
2010
Network Security represents a continuously moving target, which has to be reached in order to assure the desired level of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2006
2006
The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites… (More)
Is this relevant?
2006
2006
Sensor network is a notion denoting an interesting subset of self-organising wireless networks. These networks are rather dense… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Modern enterprise resource planning (ERP) systems like SAP R/3 or Oracle Applications consist of many software components which… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2002
2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class… (More)
  • figure 1
Is this relevant?
2001
2001
Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access… (More)
  • figure 1
  • figure 3
Is this relevant?
1998
1998
nels in the future. Furthermore, teleservices process more Emerging telecommunication services use, store, or transmit sensitive… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?