Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,613,956 papers from all fields of science
Search
Sign In
Create Free Account
Secure by default
Security by default, in software, means that the default configuration settings are the most secure settings possible, which are not necessarily the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Authentication
Comparison of BSD operating systems
Computer
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Towards oblivious sandboxing with Capsicum
Jonathan Anderson
,
Stanley Godfrey
,
Robert N MWatson
2017
Corpus ID: 51687423
Capsicum [Wat+10] is a framework for principled, coherent compartmentalization of FreeBSD applications. It is principled in that…
Expand
2017
2017
Secure by default - the case of TLS
M. Stanek
arXiv.org
2017
Corpus ID: 27617696
Default configuration of various software applications often neglects security objectives. We tested the default configuration of…
Expand
2016
2016
Selection of Methods to Provide End-to-End Email Traffic Security
A. Petrosyan
,
Gurgen S. Petrosyan
2016
Corpus ID: 169695577
The goal of the research described in this paper is to select methods of securing Email traffic. While it is known that Email…
Expand
2014
2014
Making The Internet Secure By Default
M. Behringer
,
Steinthor Bjarnason
,
Max Pritikin
2014
Corpus ID: 64169448
Pervasive monitoring on the Internet is enabled by the lack of general, fundamental security. In his presentation at the 88th…
Expand
2013
2013
Securing End-to-End Internet communications using DANE protocol
2013
Corpus ID: 41206469
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook…
Expand
2009
2009
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Matthias Schmidt
,
N. Fallenbeck
,
Matthew Smith
,
Bernd Freisleben
EUROMICRO Conference on Software Engineering and…
2009
Corpus ID: 14969541
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible…
Expand
2004
2004
Installing Internet Information Services (IIS) 6.0
C. H. Cheah
,
K. Schaefer
,
C. Peiris
2004
Corpus ID: 64250717
2004
2004
Delegating and Controlling Permissions in Exchange 2003
H. Walther
,
P. Santry
2004
Corpus ID: 61740065
2004
2004
Microsoft Windows Server 2003: Security Enhancements and New Features
Ronald Centeno Montehermoso
2004
Corpus ID: 60715178
Abstract : The purpose of this thesis is to discuss the new features and enhancements of Windows Server 2003. Windows NT and…
Expand
2001
2001
Firewalling a Secure Shell Service
A. Prasetijo
,
M. Looi
,
A. Clark
,
Gary Gaskell
,
P. Ashley
,
J. Claessens
2001
Corpus ID: 3719794
The security threats to networked systems have increased. The demand for accessing hosts remotely in a secure manner is therefore…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required