Sciweavers

1521 search results - page 3 / 305
» The Evolution of Information Assurance
Sort
View
SAC
2000
ACM
15 years 1 months ago
Assurance Protocols and Small Web Retailers
Many Web areas are in an early technological period of rapid evolution and intense competitive selection. Nowhere is this truer than with electronic commerce. While much is being ...
G. E. Lyon
HASE
2008
IEEE
15 years 3 months ago
Using Multi-Level Security Annotations to Improve Software Assurance
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...
Eryk Kylikowski, Riccardo Scandariato, Wouter Joos...
COLCOM
2008
IEEE
15 years 3 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
85
Voted
IEEEIAS
2008
IEEE
15 years 3 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro
CNSM
2010
14 years 7 months ago
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
Amy Fedyk, Michael Atighetchi, Partha Pratim Pal