Sciweavers

3544 search results - page 47 / 709
» Information Security in Open Systems
Sort
View
SIGOPSE
2004
ACM
15 years 4 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
15 years 5 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
82
Voted
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 3 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
122
Voted
IEEEARES
2007
IEEE
15 years 5 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
APSEC
2004
IEEE
15 years 2 months ago
MUDABlue: An Automatic Categorization System for Open Source Repositories
Open Source communities typically use a software repository to archive various software projects with their source code, mailing list discussions, documentation, bug reports, and ...
Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushit...