Sciweavers

434 search results - page 3 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
AINA
2007
IEEE
13 years 9 months ago
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows
Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Zijiang Yang, Shiyong Lu, Ping Yang
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 9 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CRITIS
2009
13 years 3 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
RAID
1999
Springer
13 years 9 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
ICSE
1999
IEEE-ACM
13 years 9 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...