Sciweavers

136 search results - page 3 / 28
» Securing interdependent assets
Sort
View
CSFW
2008
IEEE
14 years 4 days ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
SIGCSE
2005
ACM
129views Education» more  SIGCSE 2005»
13 years 11 months ago
Teaching students to hack: curriculum issues in information security
1 Teaching “hacking” as a legitimate means of training students in how to protect a future employer’s data assets has been introduced
Patricia Y. Logan, Allen Clarkson
ICCSA
2005
Springer
13 years 11 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
WOA
2007
13 years 6 months ago
Agents and Security in a Cultural Assets Transport Scenario
Abstract— Museums and exhibitions represent a relevant contribution to the economy all over the world. In Italy, in the year 2006 the 400 national museums, monuments and archaeol...
Stefania Costantini, Arianna Tocchio, Panagiota Ts...
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...