Sciweavers

1587 search results - page 30 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
15 years 2 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss
AAAI
1996
14 years 11 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ACMSE
2006
ACM
15 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin