GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Zhang, Jie  (2)
  • Mathematics  (2)
Material
Person/Organisation
Language
Years
FID
Subjects(RVK)
  • Mathematics  (2)
RVK
  • 1
    Online Resource
    Online Resource
    Elsevier BV ; 2023
    In:  Information Sciences Vol. 625 ( 2023-05), p. 639-655
    In: Information Sciences, Elsevier BV, Vol. 625 ( 2023-05), p. 639-655
    Type of Medium: Online Resource
    ISSN: 0020-0255
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2023
    detail.hit.zdb_id: 218760-7
    detail.hit.zdb_id: 1478990-5
    SSG: 24,1
    SSG: 7,11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2015
    In:  ACM Computing Surveys Vol. 48, No. 1 ( 2015-09-29), p. 1-42
    In: ACM Computing Surveys, Association for Computing Machinery (ACM), Vol. 48, No. 1 ( 2015-09-29), p. 1-42
    Abstract: Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. Collaborative security is an abstract concept that applies to a wide variety of systems and has been used to solve security issues inherent in distributed environments. Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection. In this survey, we focus on different mechanisms of collaboration and defense in collaborative security. We systematically investigate numerous use cases of collaborative security by covering six types of security systems. Aspects of these systems are thoroughly studied, including their technologies, standards, frameworks, strengths and weaknesses. We then present a comprehensive study with respect to their analysis target, timeliness of analysis, architecture, network infrastructure, initiative, shared information and interoperability. We highlight five important topics in collaborative security, and identify challenges and possible directions for future research. Our work contributes the following to the existing research on collaborative security with the goal of helping to make collaborative security systems more resilient and efficient. This study (1) clarifies the scope of collaborative security, (2) identifies the essential components of collaborative security, (3) analyzes the multiple mechanisms of collaborative security, and (4) identifies challenges in the design of collaborative security.
    Type of Medium: Online Resource
    ISSN: 0360-0300 , 1557-7341
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2015
    detail.hit.zdb_id: 215909-0
    detail.hit.zdb_id: 1495309-2
    detail.hit.zdb_id: 626472-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...