Sciweavers

129 search results - page 5 / 26
» Guidelines for designing IT security management tools
Sort
View
ICSEA
2007
IEEE
15 years 3 months ago
Software Environment for Research on Evolving User Interface Designs
We investigate the trade off between investing effort in improving the features of a research environment that increases productivity and investing such effort in actually conduct...
Juan C. Quiroz, Anil Shankar, Sergiu M. Dascalu, S...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 3 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
ESORICS
2007
Springer
15 years 3 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
CHIMIT
2009
ACM
15 years 4 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SAFECOMP
2000
Springer
15 years 1 months ago
Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems
Increasingly, the dependability of vehicle based programmable systems is becoming a key feature in ensuring the safety of those in and around the vehicle. The goal of those respons...
Richard Evans, Jonathan D. Moffett