Vocabs
Terms
Agents
SPARQL/Dump
Terms
24
results
stac:PassiveAttack
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#PassiveAttack
rdfs:comment
Malicious users violate the confidentiality
of
@en
stac:DigitalSignature
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#DigitalSignature
rdfs:comment
of
the electronic message have not been altered.
@en
stac:GPRSArchitecture
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#GPRSArchitecture
rdfs:comment
intruders, because
of
its IP based backbone.
@en
stac:MAC
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#MAC
rdfs:comment
MAC is a short piece
of
information used to
@en
stac:ActiveAttack
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#ActiveAttack
rdfs:comment
adversaries to gain the control
of
the network.
@en
stac:AnonymityMethod
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#AnonymityMethod
rdfs:comment
to track the whereabouts
of
a certain user.
@en
stac:Worm
(
stac
)
0.009
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#Worm
rdfs:comment
Worms are self-propagating pieces
of
malicious
@en
stac:Feature
(
stac
)
0.008
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#Feature
rdfs:comment
Features
of
security mechanisms. For example a
@en
stac:ABAC
(
stac
)
0.008
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#ABAC
rdfs:comment
Permissions are associated with a set
of
rules
@en
stac:AccessControlMethod
(
stac
)
0.008
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#AccessControlMethod
rdfs:comment
owners
of
resources to define, manage and enforce
@en
1
2
3