Ditemukan 9 dokumen yang sesuai dengan query
Rendy Wijaya
"
Perkembangan teknologi saat ini yang berkembang sangat pesat disertai penggunaan perangkat mobile yang sangat marak, maka diperlukan sebuah management system yang bisa mengatur semua hal itu. Mobile Device Management (MDM) adalah system yang sesuai untuk mengatur itu semua. Selain itu, MDM itu sendiri memiliki kaitan yang erat dengan Bring Your Own Device (BYOD) yang saat ini telah menjadi tren di masyarakat. Beberapa aspek yang dibahas dalam MDM itu adalah Bandwidth Control. Hasil dari pengujian Bandwidth ...
"
Depok: Fakultas Teknik Universitas Indonesia, 2013
S46407
UI - Skripsi Membership Universitas Indonesia Library
Elvin Aliyev
"
Software-Defined Networking (SDN) merupakan istilah umum yang mencakup beberapa jenis teknologi jaringan yang bertujuan untuk membuat jaringan cerdas dan fleksibel sebagai sebagai server virtual dan infrastruktur penyimpanan pusat data modern. SDN adalah pemisahan control plane (yang membuat keputusan tentang bagaimana paket harus mengalir melalui jaringan) dari data plane (berfungsi packet-forwarding). Controller dan switch berkomunikasi melalui "south-bound" yang disebut OpenFlow protocol.
Skripsi ini membahas tentang salah satu bagian paling penting ...
"
Depok: Fakultas Teknik Universitas Indonesia, 2015
S59836
UI - Skripsi Membership Universitas Indonesia Library
"
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds ...
"
Heidelberg: Springer, 2012
e20408219
eBooks Universitas Indonesia Library
Johnson, Simon
New York: McGraw-Hill, 2004
303.48 JOH k
Buku Teks Universitas Indonesia Library
"
The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that ...
"
Dordrecht, Netherlands: Springer, 2012
e20406903
eBooks Universitas Indonesia Library
Davide Balzarotti
"
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection ...
"
Berlin: Springer-Verlag, 2012
e20409379
eBooks Universitas Indonesia Library
"
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices, signature schemes, encryption schemes, efficient two-party and multi-party computation, security in the UC framework, cryptanalysis; efficient constructions, and protocols and combiners ...
"
Berlin: Springer-Verlag, 2012
e20409399
eBooks Universitas Indonesia Library
"
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation ...
"
Berlin: Springer-Verlag, 2012
e20409976
eBooks Universitas Indonesia Library
"
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, ...
"
Berlin: Springer-Verlag, 2012
e20410446
eBooks Universitas Indonesia Library