Sciweavers

2504 search results - page 53 / 501
» Enterprise Security Architecture
Sort
View
SAINT
2002
IEEE
15 years 4 months ago
The Internet Enterprise
In this paper we present our vision of the Internet Enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations...
Abdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja...
ICETE
2004
204views Business» more  ICETE 2004»
15 years 1 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CCS
2006
ACM
15 years 3 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 6 months ago
Business Intelligence for Small and Middle-Sized Entreprises
Data warehouses are the core of decision support systems, which nowadays are used by all kind of enterprises in the entire world. Although many studies have been conducted on the ...
Oksana Grabova, Jérôme Darmont, Jean-...
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 28 days ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald