Sciweavers

575 search results - page 14 / 115
» A model for evaluating IT security investments
Sort
View
134
Voted
ICEXSS
2010
14 years 8 months ago
Towards a Model for Measuring Customer Intimacy in B2B Services
This paper proposes an approach for evaluating the relationship with a customer, leading to the creation of a Customer Intimacy Grade (CIG), across multiple levels of granularity: ...
François Habryn, Benjamin Blau, Gerhard Sat...
WSC
2004
15 years 3 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
CCS
2006
ACM
15 years 5 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
FLAIRS
2000
15 years 3 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 2 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...