Sciweavers

575 search results - page 33 / 115
» A model for evaluating IT security investments
Sort
View
112
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Achieving Long-Term Surveillance in VigilNet
Abstract— Energy efficiency is a fundamental issue for outdoor sensor network systems. This paper presents the design and implementation of multi-dimensional power management st...
Tian He, Pascal Vicaire, Ting Yan, Qing Cao, Gang ...
WSC
1998
15 years 3 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
ICCS
2005
Springer
15 years 7 months ago
GIVS: Integrity Validation for Grid Security
Abstract. In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence...
Giuliano Casale, Stefano Zanero
NSDI
2008
15 years 4 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
CCS
2010
ACM
15 years 8 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang