Networks Computers Security
Mostrando 1-10 de 10 artigos, teses e dissertações.
-
1. Plano de segurança para autenticação de dados em redes orientadas à informação / Security plane for data authentication in information-centric networks
A segurança da informação é responsável pela proteção das informações contra o acesso nãoautorizado, uso, modificação ou a sua destruição. Com o objetivo de proteger os dados contra esses ataques de segurança, vários protocolos foram desenvolvidos, tais como o Internet Protocol Security (IPSEC) e o Transport Layer Security (TLS), provendo mec
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 23/09/2011
-
2. Novas fronteiras para a comunicação ativista em rede : um olhar sobre o centro de mídia independente / New frontiers for activist communication networks : a look on the independent media center
This research stems from an investigation into the repertoires of political action of the Independent Media Center, a network of activist organizations and distributed through a worldwide network of computers. The proposed research addresses the relationship between social movements and the media, which conforms to a new structure of communication and resour
Publicado em: 2010
-
3. Application of mathematical analysis in IP number backtracking to use in TCP/IP networks under denial-of-servicfe attack. / AplicaÃÃo da anÃlise matemÃtica no rastreamento reverso do nÃmero IP para o uso em redes TCP/IP sob ataque de negaÃÃo-de-serviÃo
The denial-of-service attack was unveiled in the year of 1988 and became a serious threat to the computer networks to carry on properly, around the world. When this kind of attack is going on the victim suffers so high increment in demanding computational resources, that they may become unavailable to the true users. Despite the fact that there exist other k
Publicado em: 2007
-
4. Users continuous authentication in computers networks. / Autenticação contínua de usuários em redes de computadores.
Context-aware Computing allows to obtain and use context informations acquired through devices in the environment, with the goal to provide services. This dynamics, allied to the computer networks evolution, has been provoking deep modifications in peoples social and behavior aspects, seeing that they have the necessity to live immersed in technology and int
Publicado em: 2006
-
5. Virtual machines in secure environments / Maquinas virtuais em ambientes seguros
Desde o início da computação a idéia de máquinas virtuais vem sendo aplicada para estender o multiprocessamento, multi-programação e multi-acesso, tornando os sistemas multi-ambiente. O contínuo aumento no poder de processamento dos computadores fez com que máquinas muito rápidas estivessem ao alcance de qualquer usuário, surgindo PCs com processa
Publicado em: 2006
-
6. Applicability of JINI technology on development of network management systems / Aplicabilidade da tecnologia JINI na construção de sistemas para gerencia de redes
In spite of the initiatives that appeared over the years in context of the IETF, some aspects related to con?guration and maintenance of systems currently developed for management of TCP/IP-based networks are still addressed in an adhoc manner. Some times, human intervention is needed, mainly during the occurence of parcial failures. This Thesis presents a s
Publicado em: 2006
-
7. REDES VIRTUAIS PRIVADAS / PRIVATE VIRTUAL NETWORK.
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cr
Publicado em: 2005
-
8. Monitoring activities in hosts prepared to be compromised (Honeypots) / Monitoração de atividades em máquinas preparadas para serem comprometidas (Honeypots)
Not long ago, information systems security was closely associated with passive protection, always assuming a purely defensive stance. Nowadays, this approach is changing. Reactive measures are helping to improve systems security, with the use of hosts prepared to be compromised (honeypots) providing information about the techniques used by the attackers, fro
Publicado em: 2004
-
9. AGENTES INTELIGENTES PARA DETECÇÃO DE INTRUSOS EM REDES DE COMPUTADORES / AGENTS FOR INTELLIGENT DETECTION OF INTRUSOS IN NETWORKS COMPUTERS
Recently, the interest for advanced techniques for network intrusion detection have been increased for protecting important information in computational environment. This research work presents a proposal of a new network intrusion detection system based on a society of intelligent agents whose reasoning are aupported by neural network paradigms, named NIDIA
Publicado em: 2002
-
10. SECURITY PROTOCOLS IN NETWORKS OF COMPUTERS / PROTOCOLOS DE SEGURANÇA EM REDES DE COMPUTADORES
This work analyses several algoritms of cryptography; among them, the DES (Data Encryption Standard), the public key algorithm RSA and the public key distribution algorithm DH of Diffie-Hellman. Three security protocols are then proposed for interactive and one-way communication in packet switched networks. The sirst protocol was proposed with the assumption
Publicado em: 1982