Sciweavers

617 search results - page 41 / 124
» Research Challenges for the Security of Control Systems
Sort
View
GRID
2007
Springer
15 years 6 months ago
Fine-grained access control for GridFTP using SecPAL
– Grid access control policy languages today are generally one of two extremes: either extremely simplistic, or overly complex and challenging for even security experts to use. I...
Marty Humphrey, Sang-Min Park, Jun Feng, Norm Beek...
SDMW
2005
Springer
15 years 5 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
WSC
2007
15 years 2 months ago
Controlled sequential bifurcation for software reliability study
Computer simulation is an appealing approach for the reliability analysis of structure-based software systems as it can accommodate important complexities present in realistic sys...
Jun Xu, Feng Yang, Hong Wan
ICPPW
2003
IEEE
15 years 5 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
SAC
2010
ACM
15 years 6 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz