Sciweavers

212 search results - page 24 / 43
» Risk Assessment and Integrity in System Design
Sort
View
KBS
2006
150views more  KBS 2006»
15 years 1 months ago
Platform-based product design and development: A knowledge-intensive support approach
This paper presents a knowledge-intensive support paradigm for platform-based product family design and development. The fundamental issues underlying the product family design an...
Xuan F. Zha, Ram D. Sriram
INFOVIS
1998
IEEE
15 years 5 months ago
Geographic Visualization: Designing Manipulable Maps for Exploring Temporally Varying Georeferenced Statistics
Geographic Visualization, sometimes called cartographic visualization, is a form of information visualization in which principles from cartography, geographic information systems ...
Alan M. MacEachren, Francis P. Boscoe, Daniel Haug...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 5 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 3 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
ISI
2008
Springer
15 years 1 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham