Sciweavers

762 search results - page 5 / 153
» Modeling and Simulating Information Security Management
Sort
View
ISF
2007
104views more  ISF 2007»
13 years 5 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 10 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
WSC
2007
13 years 8 months ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
ECSA
2010
Springer
13 years 6 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...