Sciweavers

2403 search results - page 66 / 481
» Cyberinsurance in IT Security Management
Sort
View
54
Voted
CCS
2010
ACM
14 years 11 months ago
An opportunistic authority evaluation scheme for data security in crisis management scenarios
Enrico Scalavino, Giovanni Russello, Rudi Ball, Va...
COMPSAC
2003
IEEE
15 years 4 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
IAW
2003
IEEE
15 years 4 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
69
Voted
ACISP
2003
Springer
15 years 2 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...