Data and Applications Security Developments and Directions
1 Implementing Firewall Technologies Source: CCNA Security.
Network Architecture for Automatic Security and Policy Enforcement Internet2 Members Meeting Fall 2005 Eric Gauthier ~ Boston University Kevin Amorin ~
Office of Information Technologies CAMP: Bridging Security and Identity Management Christopher Misra 14 February 2008 Tempe, AZ Protecting Network Assets.
Monitoring-Based System for E2E Security Auditing and Enforcement in Trusted and Untrusted SOA.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 2014 Assured Cloud Computing for Assured Information Sharing.
Access Control in Data Management Systems Dr. Bhavani Thuraisingham The University of Texas at Dallas Access Control and Policies in Data Management Systems.
Protecting Network Assets