1 resultado para Software Acquisition
em Research Open Access Repository of the University of East London.
Filtro por publicador
- JISC Information Environment Repository (2)
- Repository Napier (1)
- Aberystwyth University Repository - Reino Unido (6)
- Adam Mickiewicz University Repository (2)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Aquatic Commons (10)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (32)
- B-Digital - Universidade Fernando Pessoa - Portugal (2)
- Biblioteca Digital da Câmara dos Deputados (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (2)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (9)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (5)
- Boston University Digital Common (6)
- Brock University, Canada (8)
- Bulgarian Digital Mathematics Library at IMI-BAS (1)
- CaltechTHESIS (3)
- Cámara de Comercio de Bogotá, Colombia (2)
- Cambridge University Engineering Department Publications Database (112)
- CentAUR: Central Archive University of Reading - UK (1)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (87)
- Cochin University of Science & Technology (CUSAT), India (14)
- CORA - Cork Open Research Archive - University College Cork - Ireland (3)
- Digital Peer Publishing (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (3)
- DRUM (Digital Repository at the University of Maryland) (2)
- Duke University (8)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (7)
- Funes: Repositorio digital de documentos en Educación Matemática - Colombia (7)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (3)
- Greenwich Academic Literature Archive - UK (26)
- Helda - Digital Repository of University of Helsinki (18)
- Indian Institute of Science - Bangalore - Índia (52)
- Infoteca EMBRAPA (11)
- Instituto Politécnico de Castelo Branco - Portugal (1)
- Instituto Politécnico do Porto, Portugal (27)
- Massachusetts Institute of Technology (9)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (4)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (168)
- Queensland University of Technology - ePrints Archive (192)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (10)
- REPOSITORIO DIGITAL IMARPE - INSTITUTO DEL MAR DEL PERÚ, Peru (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (9)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (3)
- Repositorio Institucional Universidad de Medellín (2)
- Research Open Access Repository of the University of East London. (1)
- RU-FFYL. Repositorio de la Facultad de Filosofiía y Letras. UNAM. - Mexico (2)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (14)
- SAPIENTIA - Universidade do Algarve - Portugal (6)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- The Scholarly Commons | School of Hotel Administration; Cornell University Research (1)
- Universidad Autónoma de Nuevo León, Mexico (13)
- Universidad Politécnica de Madrid (19)
- Universidade de Lisboa - Repositório Aberto (4)
- Universidade de Madeira (1)
- Universidade Federal do Pará (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (2)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (7)
- Université de Lausanne, Switzerland (8)
- Université de Montréal, Canada (23)
- University of Michigan (3)
- University of Washington (2)
- WestminsterResearch - UK (3)
Resumo:
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.