Sciweavers

4 search results - page 1 / 1
» On the Risk Exposure and Priority Determination of Changes i...
Sort
View
DSOM
2007
Springer
13 years 11 months ago
On the Risk Exposure and Priority Determination of Changes in IT Service Management
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
Jacques Philippe Sauvé, Rodrigo A. Santos, ...
COMCOM
2007
100views more  COMCOM 2007»
13 years 4 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
LISA
2007
13 years 7 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
CONEXT
2009
ACM
13 years 6 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...