Sciweavers

5970 search results - page 962 / 1194
» Management Information Model Engineering
Sort
View
114
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
SACMAT
2006
ACM
15 years 10 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
121
Voted
HICSS
2005
IEEE
187views Biometrics» more  HICSS 2005»
15 years 10 months ago
Change and Resistance Help for the Practitioner of Change
Change and the resistance to change has been a common occurrence probably since before recorded time. It is normal to resist that which may bring unfamiliarity and the unknown int...
Richard W. Egan, Jerry Fjermestad
ICDCS
2005
IEEE
15 years 10 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
127
Voted
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 10 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick