Sciweavers

3149 search results - page 57 / 630
» IT security risk management
Sort
View
58
Voted
IAW
2003
IEEE
15 years 5 months ago
Risk Probability Estimating Based on Clustering
Yong Chen, Christian Damsgaard Jensen, Jean-Marc S...
110
Voted
JCP
2008
104views more  JCP 2008»
15 years 15 days ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang
123
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
92
Voted
CCS
2009
ACM
15 years 7 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
92
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten