Sciweavers

95 search results - page 1 / 19
» Risk assessment in distributed authorization
Sort
View
CCS
2005
ACM
13 years 10 months ago
Risk assessment in distributed authorization
Peter C. Chapin, Christian Skalka, Xiaoyang Sean W...
JCS
2007
103views more  JCS 2007»
13 years 4 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
EUSFLAT
2001
116views Fuzzy Logic» more  EUSFLAT 2001»
13 years 6 months ago
Risk assessment in natural disasters with fuzzy probabilities
Risk assessment in regions with low earthquake activity is important for reinsurance companies and governmental building authorities. They need a complete picture of the possible ...
Uwe Wagner
SIN
2010
ACM
13 years 2 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
EDOC
2002
IEEE
13 years 9 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...