Sciweavers

335 search results - page 33 / 67
» Biometrics and Security
Sort
View
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 8 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
ICDAR
2003
IEEE
15 years 7 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
HICSS
2009
IEEE
140views Biometrics» more  HICSS 2009»
15 years 8 months ago
Infrastructure Protection in the Ancient World
This paper provides lessons learned from ancient Roman attempts to protect the aqueduct, which was considered one of their most critical infrastructures. It also offers an analogy...
Michael J. Assante
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 7 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 8 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard