Sciweavers

13 search results - page 2 / 3
» Assessment of Enterprise Information Security - The Importan...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 3 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
IIWAS
2004
13 years 6 months ago
Building the Architecture of A Statistics-Based Query Optimization Solution for Heterogeneous Mediators
Access to different and remote sources with heterogeneous formats is one of the most important challenges in Enterprise Information Integration. Even though there exists an increa...
Justo Hidalgo, Alberto Pan, José Losada, Ma...
SCAM
2003
IEEE
13 years 10 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
13 years 9 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
IEEEARES
2006
IEEE
13 years 11 months ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...