보안402 [Josef Noll] Measurable security for the Internet of People, Things and Services Semantic technologies for attribute based access: measurable security for the Internet of People, Things and Services from Josef Noll 2014. 5. 22. [Gerardo Pardo-Castellote] OMG Data-Distribution Service Security OMG Data-Distribution Service Security from Gerardo Pardo-Castellote 2014. 5. 22. [WSO2] Security Patterns with WSO2 ESB Security Patterns with WSO2 ESB from WSO2 2014. 5. 21. [US-CERT: Bulletin(SB14-139)] 2014년 5월 12일까지 발표된 보안 취약점 원본기사 확인하기: [US-CERT: Bulletin(SB14-139)] 2014년 5월 12일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they ha.. 2014. 5. 20. 이전 1 ··· 81 82 83 84 85 86 87 ··· 101 다음