Sciweavers

414 search results - page 17 / 83
» Secure Border Control Processes
Sort
View
IEEEIAS
2007
IEEE
15 years 6 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
SIGOPSE
2004
ACM
15 years 5 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
IJCNN
2007
IEEE
15 years 6 months ago
Faults Detection and Isolation Based On Neural Networks Applied to a Levels Control System
Abstract— Each time more grows the necessity of guaranteeing itself security and trustworthiness of the equipment during the execution of the industrials processes. Then, it is v...
Raphaela G. Fernandes, Diego R. Cabral Silva, Luiz...
86
Voted
ACSAC
1998
IEEE
15 years 4 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
SPW
2001
Springer
15 years 4 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...