Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,695,207 papers from all fields of science
Search
Sign In
Create Free Account
Security modes
Known as:
Dedicated Security Mode
Generally, Security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Access control
Authentication
Bell–LaPadula model
Discretionary access control
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An Introduction of History
Sumanta K Ghosh
2019
Corpus ID: 214317754
History is an enquiry about the actions of human being that have done in the past. The subject matter of history is not the past…
Expand
2018
2018
Uma revisão sistemática sobre a Segurança nos Protocolos de Comunicação para Internet das Coisas
Walter do Espirito Santo
,
E. D. M. Ordonez
,
Admilson de Ribamar Lima Ribeiro
Journal on Advances in Theoretical and Applied…
2018
Corpus ID: 69746554
Este artigo apresenta uma pesquisa sobre os principais problemas de segurança que afetam os protocolos de comunicação no contexto…
Expand
2017
2017
Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts
Md. Shahrear Iqbal
,
Mohammad Zulkernine
Information Security Conference
2017
Corpus ID: 8312902
Smartphones are becoming ubiquitous and we use them for different types of tasks. One problem of using the same device for…
Expand
2016
2016
SAM: A secure anti-malware framework for the smartphone operating systems
Md. Shahrear Iqbal
,
Mohammad Zulkernine
IEEE Wireless Communications and Networking…
2016
Corpus ID: 16335644
Smartphones have become an integral part of our daily life. Businesses now offer services through smartphones. Users also store…
Expand
2013
2013
Additional Security Modes for CoAP
L. Seitz
,
G. Selander
2013
Corpus ID: 168222855
The CoAP draft defines how to use DTLS as security mechanism. In order to establish which nodes are trusted to initiate a DTLS…
Expand
2012
2012
On the feasibility of secure application-layer communications on the Web of Things
J. Granjal
,
E. Monteiro
,
J. Silva
37th Annual IEEE Conference on Local Computer…
2012
Corpus ID: 11752634
The availability of inexpensive sensing devices capable of wireless communications enables the design of exciting and new…
Expand
2009
2009
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings
Information Security Practice and Experience
2009
Corpus ID: 8341024
Review
2009
Review
2009
Bluetooth security in the DoD
John Padgette
IEEE Military Communications Conference
2009
Corpus ID: 1775256
Bluetooth is one of the most widely available wireless technologies with over 2 billion Bluetooth-enabled devices shipped. Used…
Expand
2003
2003
Security issues in the ABELS system for linking distributed simulations
G. A. Korsah
,
L. F. Wilson
Annual Simulation Symposium
2003
Corpus ID: 1431114
The Agent-Based Environment for Linking Simulations (ABELS) framework is designed to allow physically distributed simulations and…
Expand
Review
2003
Review
2003
Internetworking and computing over satellite networks [Book Reviews]
I. Nikolaidis
IEEE Network
2003
Corpus ID: 21160816
This article discusses postpregnancy programs that include family planning. Empirical evidence suggests that postpartum care is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE