Sciweavers

2337 search results - page 105 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
CAISE
2003
Springer
15 years 3 months ago
Aligning Application Architecture to the Business Context
Abstract. Alignment of application architecture to business architecture is a central problem in the design, acquisition and implementation of information systems in current large-...
Roel Wieringa, Henk M. Blanken, Maarten M. Fokking...
CCS
2007
ACM
15 years 4 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
ICPR
2004
IEEE
15 years 11 months ago
Face Verification System Architecture Using Smart Cards
A smart card based face verification system is proposed in which the feature extraction and decision making is performed on the card. Such an architecture has many privacy and sec...
Josef Kittler, Kieron Messer, Thirimachos Bourlai
IFIP
2007
Springer
15 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
IFIP
2001
Springer
15 years 2 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley