SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security

2016 ◽  
Author(s):  
Simha Sethumadhavan ◽  
Salvatore Stolfo ◽  
Angelos D. Keromytis ◽  
Junfeng Yang ◽  
David August
Keyword(s):  
2003 ◽  
pp. 241-261
Author(s):  
Amanda Andress
Keyword(s):  

2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


Author(s):  
Carl S. Guynes ◽  
Yu Andy Wu ◽  
John Windsor

E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks.


2014 ◽  
Vol 519-520 ◽  
pp. 193-196
Author(s):  
Jing Wu ◽  
Feng Zhi Zhao ◽  
Yu Dan Dong

As a new cloud computing services and computing model itself does not break away from traditional concepts of information security coverage, still faces a variety of traditional security threats, including physical physical security, network security, host security. Because of their characteristics of cloud computing will lead to generate some new security issues, such as internal virtual machine to attack each other, the super administrator rights and other issues. In this paper, cloud computing security problems faced by specific solutions.


1995 ◽  
Vol 4 (1) ◽  
pp. 37-43
Author(s):  
Douglas G. Conorich
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document