Sciweavers

3544 search results - page 23 / 709
» Information Security in Open Systems
Sort
View
CCS
2009
ACM
15 years 5 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 4 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
CSREASAM
2006
14 years 12 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 5 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
IAAI
2001
14 years 12 months ago
An Open Architecture for Multi-Domain Information Extraction
This paper presents a multi-domain information extraction system. The overall architecture of the system is detailed. A set of machine learning tools helps the expert to explore t...
Thierry Poibeau