The Network Security Analysis System Design Based on B/S Structure
Abstract
References
Index Terms
- The Network Security Analysis System Design Based on B/S Structure
Recommendations
Network Security Platform Design Based on WWW Information System
MVHI '10: Proceedings of the 2010 International Conference on Machine Vision and Human-machine InterfaceNetwork security involves the security of data transmission, the confidentiality of communications, the legitimacy of key management; it is a comprehensive application of information security technology. Shopping on the Internet in the business ...
Secure Campus Network System with Automatic Isolation of High Security Risk Device
SIGUCCS '18: Proceedings of the 2018 ACM SIGUCCS Annual ConferenceIn recent years, there are many problems of network security such data breaches and unauthorized access due to targeted attacks on vulnerabilities. The campus network in a university is under various threats as well as corporate networks. In addition, ...
On virtual private networks security design issues
The concept of virtual private networks (VPNs) provides all economical and efficient solution on communicating private information securely over public network infrastructure.In this paper, we discuss two issues on the design of VPN. We first propose ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
In-Cooperation
- Wuhan Univ.: Wuhan University, China
- City University of Hong Kong: City University of Hong Kong
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 147Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in