ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Robust Enterprise Application Security with eTRON Architecture
Enterprise Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-54380-2_7
◽
2017
◽
pp. 155-178
◽
Cited By ~ 2
Author(s):
M. Fahim Ferdous Khan
◽
Ken Sakamura
◽
Noboru Koshizuka
Keyword(s):
Application Security
◽
Enterprise Application
Download Full-text
Related Documents
Cited By
References
Enterprise Application Security - How to Balance the Use of Code Reviews and Web Application Firewalls for PCI Compliance
SSRN Electronic Journal
◽
10.2139/ssrn.1264694
◽
2008
◽
Author(s):
Ulf T. Mattsson
Keyword(s):
Web Application
◽
Application Security
◽
Enterprise Application
◽
Pci Compliance
Download Full-text
Enterprise Application Security in Android Devices Using Short Messaging Service under Unified Communication Framework
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)
◽
10.1109/uic-atc-scalcom-cbdcom-iop.2015.140
◽
2015
◽
Author(s):
Souvik Chowdhury
◽
Prasun Ghosal
Keyword(s):
Application Security
◽
Communication Framework
◽
Enterprise Application
◽
Short Messaging Service
Download Full-text
Role Based Access Control in Enterprise Application ¿ Security Administration and User Management
2006 IEEE International Conference on Information Reuse & Integration
◽
10.1109/iri.2006.252397
◽
2006
◽
Cited By ~ 4
Author(s):
Vinith Bindiganavale
◽
Jinsong Ouyang
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Application Security
◽
Enterprise Application
◽
User Management
◽
Role Based
Download Full-text
Performance Analysis of Unified Enterprise Application Security Framework
2005 Student Conference on Engineering Sciences and Technology
◽
10.1109/sconest.2005.4382878
◽
2005
◽
Author(s):
Riaz A. Shaikh
◽
Kashif Sharif
◽
Ejaz Ahmed
Keyword(s):
Performance Analysis
◽
Security Framework
◽
Application Security
◽
Enterprise Application
Download Full-text
Comparative analysis and design philosophy of next generation unified enterprise application security
Proceedings of the IEEE Symposium on Emerging Technologies, 2005.
◽
10.1109/icet.2005.1558935
◽
2005
◽
Cited By ~ 2
Author(s):
R.A. Shaikh
◽
S. Rajput
◽
S.M.H. Zaidi
◽
K. Sharif
Keyword(s):
Comparative Analysis
◽
Next Generation
◽
Application Security
◽
Analysis And Design
◽
Design Philosophy
◽
Enterprise Application
Download Full-text
Entropy-based gray relational analysis in evaluation of power supply enterprise application security
Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference
◽
10.1109/csqrwc.2011.6037264
◽
2011
◽
Author(s):
Wei Li
◽
Man Wei
◽
Zuxin Zhang
Keyword(s):
Power Supply
◽
Gray Relational Analysis
◽
Application Security
◽
Relational Analysis
◽
Enterprise Application
◽
Power Supply Enterprise
Download Full-text
EISA – An Enterprise Application Security Solution for Databases
Information Systems Security - Lecture Notes in Computer Science
◽
10.1007/11593980_12
◽
2005
◽
pp. 164-176
◽
Cited By ~ 4
Author(s):
V. Radha
◽
N. Hemanth Kumar
Keyword(s):
Application Security
◽
Enterprise Application
Download Full-text
SOA based web service adaptation in enterprise application integration
Periodica Polytechnica Electrical Engineering
◽
10.3311/pp.ee.2009-3-4.05
◽
2009
◽
Vol 53
(3-4)
◽
pp. 123
Author(s):
Péter Martinek
◽
Béla Szikora
Keyword(s):
Web Service
◽
Enterprise Application Integration
◽
Application Integration
◽
Enterprise Application
◽
Service Adaptation
Download Full-text
An Imperative Analysis of diverse State of Art Solutions for Internet and Web Application Security
International conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, 2014 Dubai (UAE)
◽
10.15242/iie.e1014055
◽
2014
◽
Keyword(s):
Web Application
◽
Web Application Security
◽
Application Security
◽
State Of Art
Download Full-text
Information technology. Application security
10.3403/30327035
◽
2018
◽
Keyword(s):
Information Technology
◽
Technology Application
◽
Application Security
◽
Information Technology Application
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close