Sciweavers

360 search results - page 4 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
IM
2007
13 years 6 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
ASIAMS
2009
IEEE
13 years 6 months ago
Uncovering Hidden Information Within University's Student Enrollment Data Using Data Mining
To date, higher educational organizations are placed in a very high competitive environment. To remain competitive, one approach is to tackle the student and administration challen...
Fadzilah Siraj, Mansour Ali Abdoulha
INFOCOM
2008
IEEE
13 years 11 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
TELSYS
2010
140views more  TELSYS 2010»
12 years 12 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 9 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo