Sciweavers

1186 search results - page 79 / 238
» A New Approach to Secure Logging
Sort
View
TOPNOC
2008
15 years 14 days ago
Translating Message Sequence Charts to other Process Languages Using Process Mining
Message Sequence Charts (MSCs) are a well known language for specifying scenarios that describe how different actors (e.g., system components, people, or organizations) interact. M...
Kristian Bisgaard Lassen, Boudewijn F. van Dongen
122
Voted
TRUSTBUS
2005
Springer
15 years 6 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
ATAL
2011
Springer
14 years 17 days ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
94
Voted
IPPS
2005
IEEE
15 years 6 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif
97
Voted
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 7 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...