Sciweavers

575 search results - page 91 / 115
» A model for evaluating IT security investments
Sort
View
ER
2008
Springer
136views Database» more  ER 2008»
15 years 3 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
129
Voted
ESIAT
2009
IEEE
14 years 11 months ago
A Novel Application of Variable Fuzzy Set on Alarming of Coalmine Gas
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Jinhui Zhao, Mingliang Li, Xu Qian, Lijuan Jia
CSFW
2004
IEEE
15 years 5 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
SRDS
2007
IEEE
15 years 8 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
112
Voted
ICCS
2007
Springer
15 years 8 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...