Sciweavers

575 search results - page 17 / 115
» A model for evaluating IT security investments
Sort
View
107
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han
118
Voted
HICSS
2012
IEEE
323views Biometrics» more  HICSS 2012»
13 years 9 months ago
The Manufacture of Potable Water: Case Analyses of Electric System Alternatives
Potable water within significant areas of the nations of the Arabian Gulf region is most frequently manufactured (cogenerated) along with electricity. The most economic process ha...
Richard D. Tabors, Siddarth Nagendraprasad, Ayoob ...
96
Voted
IEEEARES
2010
IEEE
15 years 8 months ago
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
—Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. Howev...
Alex Hai Wang, Su Yan, Peng Liu
ISPEC
2007
Springer
15 years 8 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
127
Voted
AGENTS
2001
Springer
15 years 6 months ago
Evaluation of modeling techniques for agent-based systems
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Onn Shehory, Arnon Sturm