Sciweavers

11 search results - page 1 / 3
» compsec 2004
Sort
View
COMPSEC
2004
181views more  COMPSEC 2004»
13 years 4 months ago
The 10 deadly sins of information security management
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause seri...
Sebastiaan H. von Solms, Rossouw von Solms
COMPSEC
2004
147views more  COMPSEC 2004»
13 years 4 months ago
Characterization of defense mechanisms against distributed denial of service attacks
We propose a characterization of distributed denial of service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a ...
Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Ca...
COMPSEC
2004
115views more  COMPSEC 2004»
13 years 4 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
COMPSEC
2004
156views more  COMPSEC 2004»
13 years 4 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 4 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...