Sciweavers

247 search results - page 22 / 50
» Infrastructure Risk Reduction
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
CIS
2008
Springer
14 years 11 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
BIS
2007
120views Business» more  BIS 2007»
14 years 11 months ago
Security Issues for the Use of Semantic Web in E-Commerce
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology’s integrity and availability. In addition, both suppliers and...
Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar ...
PAKM
2000
14 years 10 months ago
Knowledge Re-Use as Engineering Re-Use: Extracting Values from Knowledge Management
This paper presents a knowledge-sharing framework for achieving effective knowledge reuse within industrial organisations. This knowledge re-use paradigm goes beyond traditional e...
Christopher Yeung, Tony Holden
DSS
2006
91views more  DSS 2006»
14 years 9 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...