Sciweavers

84 search results - page 10 / 17
» Addressing Complexity in a Privacy Expert System
Sort
View
ACSAC
2008
IEEE
15 years 8 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CCS
2009
ACM
16 years 2 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
129
Voted
SAFECOMP
1999
Springer
15 years 6 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
121
Voted
OTM
2005
Springer
15 years 7 months ago
Middleware for Distributed Context-Aware Systems
Abstract. Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context ...
Karen Henricksen, Jadwiga Indulska, Ted McFadden, ...
95
Voted
IJMI
2007
134views more  IJMI 2007»
15 years 1 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll