Sciweavers

318 search results - page 2 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
DSN
2009
IEEE
13 years 11 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...
CRITIS
2009
13 years 2 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
IFIP
2007
Springer
13 years 11 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
ECOOPW
1998
Springer
13 years 9 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
KBSE
2006
IEEE
13 years 11 months ago
ArchTrace: Policy-Based Support for Managing Evolving Architecture-to-Implementation Traceability Links
Traditional techniques of traceability detection and management are not equipped to handle evolution. This is a problem for the field of software architecture, where it is critica...
Leonardo Gresta Paulino Murta, André van de...