1 resultado para Drive Components.
em Research Open Access Repository of the University of East London.
Filtro por publicador
- Aberystwyth University Repository - Reino Unido (1)
- Aquatic Commons (5)
- Archive of European Integration (4)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (6)
- Aston University Research Archive (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (13)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (1)
- Boston University Digital Common (1)
- Brock University, Canada (8)
- CaltechTHESIS (1)
- Cambridge University Engineering Department Publications Database (118)
- CentAUR: Central Archive University of Reading - UK (78)
- Center for Jewish History Digital Collections (4)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (60)
- Cochin University of Science & Technology (CUSAT), India (4)
- CORA - Cork Open Research Archive - University College Cork - Ireland (6)
- CUNY Academic Works (1)
- Dalarna University College Electronic Archive (8)
- Department of Computer Science E-Repository - King's College London, Strand, London (1)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digital Commons at Florida International University (2)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (4)
- Ecology and Society (1)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (10)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (1)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (1)
- Greenwich Academic Literature Archive - UK (14)
- Helda - Digital Repository of University of Helsinki (15)
- Indian Institute of Science - Bangalore - Índia (116)
- Instituto Politécnico de Bragança (1)
- Instituto Politécnico do Porto, Portugal (3)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (3)
- Massachusetts Institute of Technology (5)
- Ministerio de Cultura, Spain (6)
- National Center for Biotechnology Information - NCBI (1)
- Open University Netherlands (1)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (5)
- Publishing Network for Geoscientific & Environmental Data (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (142)
- Queensland University of Technology - ePrints Archive (149)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (3)
- Repositório digital da Fundação Getúlio Vargas - FGV (4)
- Repositório Institucional da Universidade de Aveiro - Portugal (3)
- Research Open Access Repository of the University of East London. (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- School of Medicine, Washington University, United States (5)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (2)
- Universidad del Rosario, Colombia (1)
- Universidade de Lisboa - Repositório Aberto (1)
- Universitat de Girona, Spain (12)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (6)
- Université de Lausanne, Switzerland (3)
- Université de Montréal, Canada (12)
- University of Michigan (3)
- University of Southampton, United Kingdom (3)
- Worcester Research and Publications - Worcester Research and Publications - UK (2)
Resumo:
This paper describes the various Geofencing Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Networks