Security service

Known as: X.800 
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2016
012319962016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In this paper a commutative watermarking and ciphering scheme for digital images is presented. The commutative property of the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Complex distributed dependable systems, such as web-based applications that contain sensitive data and are exposed to many users… (More)
  • figure 1
  • table 1
  • figure 5
  • figure 6
  • figure 4
Is this relevant?
2008
2008
Security has become an important requirement for HA systems. To address this, the SA Forum Security service (SEC) Specifications… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Wireless Mobile Ad hoc NETwork (WMANET) is a group of an independent wireless (Mobile/ Semi Mobile) nodes communicating on a peer… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2006
2006
The resource reservation protocol (RSVP) lets hosts request quality of (bandwidth) service for multicast applications on the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2005
2005
This chapter analyzes the various types of policies implemented by the web security services. According to X.800 definition five… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
1999
1999
A popular business paradigm for information systems treats the information infrastructure as a corporate utility. In this model… (More)
  • table 1
Is this relevant?
1999
1999
The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of… (More)
  • figure 1
  • figure 2
  • table 3
  • table 1
  • table 2
Is this relevant?
1996
1996
Requirements for SLAs are generally well understood and have been in existence for many years. With the introduction of… (More)
Is this relevant?