scispace - formally typeset
Search or ask a question
Topic

Security service

About: Security service is a research topic. Over the lifetime, 17310 publications have been published within this topic receiving 309251 citations.


Papers
More filters
01 Oct 1972
TL;DR: This document is intended to assist in the management of government procurement operations and will not be used for other purposes other than a definitely related government procurement operation.
Abstract: Approved for pubJic reJease; distribution unri mited. When U.S. Government drawings, specifications or other data are used for any purpose other than a definitely related government procurement operation, the government thereby incurs no responsibility nor any obligation whatsoever; and the fact that the government may have formulated, fui·nished, or in any way sup­ plied the said drawings, specifications, or other data is not to be regarded by implication or otherwise as in any manner licensing the holder or any other person or conveying any rights or permission to manufacture, use, or sell any patented invention that may in any way be related thereto.

810 citations

Book
22 Sep 2011
TL;DR: In this article, the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication are presented, using a bottom-up approach from the link level all the way to end-to-end architectures.
Abstract: This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.

805 citations

Journal ArticleDOI
TL;DR: In this article, the concept of security has been disentangled from normative and empirical concerns, however legitimate they may be, and the authors seek to disentangle the notion of security from normative arguments about which values of which groups of people should be protected and empirical arguments as to the nature and magnitude of threats to those values.
Abstract: Redefining ‘security’ has recently become something of a cottage industry.E.g. Lester Brown, Redefining National Security, Worldwatch Paper No. 14 (Washington, DC, 1977); Jessica Tuchman Matthews, ‘Redefining Security’, Foreign Affairs, 68 (1989), pp. 162-77; Richard H. Ullman, ‘Redefining Security’, International Security, 8 (1983), pp. 129-53; Joseph J. Romm, Defining National Security (New York, 1993); J. Ann Tickner, ‘Re-visioning Security’, in Ken Booth and Steve Smith (eds.), International Relations Theory Today (Oxford, 1995), pp. 175-97; Ken Booth, ‘Security and Emancipation’, Review of International Studies, 17 (1991), pp. 313-26; Martin Shaw, ‘There Is No Such Thing as Society: Beyond Individualism and Statism in International Security Studies’, Review of International Studies, 19 (1993), pp. 159-75; John Peterson and Hugh Ward, ‘Coalitional Instability and the New Multidimensional Politics of Security: A Rational Choice Argument for US-EU Cooperation’, European Journal of International Relations, 1 (1995), pp. 131-56; ten articles on security and security studies in Arms Control, 13, (1992), pp. 463-544; and Graham Allison and Gregory F. Treverton (eds.), Rethinking America's Security: Beyond Cold War to New World Order (New York, 1992). Most such efforts, however, are more concerned with redefining the policy agendas of nation-states than with the concept of security itself. Often, this takes the form of proposals for giving high priority to such issues as human rights, economics, the environment, drug traffic, epidemics, crime, or social injustice, in addition to the traditional concern with security from external military threats. Such proposals are usually buttressed with a mixture of normative arguments about which values of which people or groups of people should be protected, and empirical arguments as to the nature and magnitude of threats to those values. Relatively little attention is devoted to conceptual issues as such. This article seeks to disentangle the concept of security from these normative and empirical concerns, however legitimate they may be.

804 citations

Journal ArticleDOI
TL;DR: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches and provides a discussion on the advantages, drawbacks, and future direction of using game theory in this field.
Abstract: This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying game-theoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

791 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
87% related
Server
79.5K papers, 1.4M citations
86% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
The Internet
213.2K papers, 3.8M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202350
2022130
202142
202094
2019124
2018156