Reducing risk with end-to-end application security automation

被引:0
|
作者
Blake, Cindy [1 ]
机构
[1] Blake, Cindy
来源
| 1600年 / Elsevier Ltd卷 / 2020期
关键词
Compliance control - Regulatory compliance - Authentication - Codes (symbols);
D O I
10.1016/S1353-4858(20)30019-2
中图分类号
学科分类号
摘要
引用
收藏
页码:6 / 8
相关论文
共 50 条
  • [1] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [2] End-to-end process automation
    Rieck, S.
    Heidelbach, J.
    Stahl, T.
    [J]. WT Werkstattstechnik, 2023, 113 (1-2): : 42 - 47
  • [3] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [4] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [5] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [6] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [7] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [8] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [9] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [10] Enforcing End-to-End Application Security in the Cloud (Big Ideas Paper)
    Bacon, Jean
    Evans, David
    Eyers, David M.
    Migliavacca, Matteo
    Pietzuch, Peter
    Shand, Brian
    [J]. MIDDLEWARE 2010, 2010, 6452 : 293 - +