Sciweavers

762 search results - page 55 / 153
» Modeling and Simulating Information Security Management
Sort
View
ITRUST
2005
Springer
15 years 7 months ago
Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language
The paper makes two main contributions: (1) It presents experiences from using the CORAS language for security threat modelling to specify legal risk scenarios. These experiences a...
Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler,...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 8 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...
92
Voted
GIL
2009
14 years 11 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
97
Voted
ACSAC
2004
IEEE
15 years 5 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
CCS
2007
ACM
15 years 5 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...