Sciweavers

54 search results - page 4 / 11
» Towards the impact of the operational environment on the sec...
Sort
View
CCS
2009
ACM
14 years 6 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
AGENTS
2000
Springer
13 years 9 months ago
MAS Infrastructure: Definitions, Needs and Prospects
This paper attempts to articulate the general role of infrastructure for multi-agent systems (MAS), and why infrastructure is a particularly critical issue if we are to increase th...
Les Gasser
JTAER
2006
100views more  JTAER 2006»
13 years 5 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
13 years 10 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ICCS
2004
Springer
13 years 10 months ago
Towards OGSA Compatibility in Alternative Metacomputing Frameworks
Abstract. Lately, grid research has focused its attention on interoperability and standards, such as Grid Services, in order to facilitate resource virtualization, and to accommoda...
Gunther Stuer, Vaidy S. Sunderam, Jan Broeckhove