Sciweavers

199 search results - page 12 / 40
» Towards an Integrated Conceptual Model of Security and Depen...
Sort
View
SACMAT
2003
ACM
15 years 2 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
FC
2004
Springer
88views Cryptology» more  FC 2004»
15 years 2 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 2 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...
JTAER
2006
100views more  JTAER 2006»
14 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
SAINT
2007
IEEE
15 years 3 months ago
Local Production, Local Consumption Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
Peer-to-peer (P2P) is a system of overlay networks such that participants can potentially take symmetrical roles. This translates itself into a design based on the philosophy of L...
Kenji Saito, Eiichi Morino, Yoshihiko Suko, Takaak...