Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,724 papers from all fields of science
Search
Sign In
Create Free Account
Open security
Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Android
Information security
Malware
Open Source Vulnerability Database
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
A Survey on Software-Defined VANETs: Benefits, Challenges, and Future Directions
Wafa Ben Jaballah
,
M. Conti
,
Chhagan Lal
arXiv.org
2019
Corpus ID: 104292203
The evolving of Fifth Generation (5G) networks isbecoming more readily available as a major driver of the growthof new…
Expand
Review
2018
Review
2018
Internet of Things: Infrastructure, Architecture, Security and Privacy
Z. Alansari
,
N. B. Anuar
,
+4 authors
Mahdi H. Miraz
International Conference on Computing…
2018
Corpus ID: 49671228
Internet of Things (IoT) is one of the emerging technologies of this century and its various aspects, such as the Infrastructure…
Expand
2011
2011
Profit-maximizing firm investments in customer information security
Y. Lee
,
R. Kauffman
,
Ryan Sougstad
Decision Support Systems
2011
Corpus ID: 27101481
2011
2011
Security Issues in a Synchronous e-Training Platform
J. C. Granda
,
Pelayo Nuño
,
D. García
,
F. J. Suárez
Sixth International Conference on Availability…
2011
Corpus ID: 476013
Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. Real…
Expand
2010
2010
Secure Business Processes in Service-Oriented Architectures -- A Requirements Analysis
Jens Müller
,
J. Mülle
,
S. V. Stackelberg
,
Klemens Böhm
Eighth IEEE European Conference on Web Services
2010
Corpus ID: 15258947
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of…
Expand
2006
2006
Smart Dust Security - Key Infection Revisited
Daniel Cvrcek
,
P. Švenda
International Workshop on Security and Trust…
2006
Corpus ID: 5503529
2006
2006
A system architecture for wireless building automation
W. Vandenberghe
,
B. Latré
,
+8 authors
G. Impens
2006
Corpus ID: 15205619
Wireless Building Automation is a complex problem dealing with a lot of trade offs: on one hand sensors and actuators have to be…
Expand
2004
2004
How Secure are Current Mobile Operating Systems?
Tobias Murmann
,
Heiko Rossnagel
Communications and Multimedia Security
2004
Corpus ID: 12755760
There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The…
Expand
Highly Cited
2000
Highly Cited
2000
MARS: A Programmable Coordination Architecture for Mobile Agents
Giacomo Cabri
,
L. Leonardi
,
F. Zambonelli
IEEE Internet Computing
2000
Corpus ID: 606621
Mobile agents offer much promise, but agent mobility and Internet openness make coordination more difficult. Mobile Agent…
Expand
1993
1993
The Open Security Architecture
Fredric B. Gluck
Information Management & Computer Security
1993
Corpus ID: 22099745
Outlines the Open Security Architecture (OSA). OSA is an architecture which will provide the basis for the selection, design and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE