Sciweavers

762 search results - page 4 / 153
» Modeling and Simulating Information Security Management
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 5 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
ACSAC
1999
IEEE
13 years 9 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
13 years 11 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
WSC
2007
13 years 7 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
CONTEXT
2007
Springer
13 years 11 months ago
On Relating Heterogeneous Elements from Different Ontologies
Chiara Ghidini, Luciano Serafini, Sergio Tessaris