Sciweavers

3149 search results - page 135 / 630
» IT security risk management
Sort
View
112
Voted
ICCS
2001
Springer
15 years 5 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
85
Voted
VLDB
2002
ACM
74views Database» more  VLDB 2002»
15 years 11 days ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
113
Voted
LCN
1999
IEEE
15 years 5 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
COCOON
2009
Springer
15 years 7 months ago
Approximation Algorithms for Key Management in Secure Multicast
Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, F...