Sciweavers

3420 search results - page 31 / 684
» A Language-Based Approach to Security
Sort
View
HAIS
2009
Springer
14 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
IEEEARES
2008
IEEE
14 years 4 months ago
An Ontological Approach to Secure MANET Management
Mobile Ad hoc Networks (MANETs) rely on dynamic configuration decisions to efficiently operate in a rapidly changing environment of limited resources. The ability of a MANET to ma...
Mark E. Orwat, Timothy E. Levin, Cynthia E. Irvine
VAMOS
2007
Springer
14 years 4 months ago
KumbangSec: An Approach for Modelling Functional and Security Variability in Software Architectures
Software products often need to vary in terms of functionality, but also in terms of quality attributes. We describe KumbangSec, which in an approach for modelling functional and ...
Varvana Myllärniemi, Mikko Raatikainen, Tomi ...
CCS
2001
ACM
14 years 2 months ago
A new approach to DNS security (DNSSEC)
The Domain Name System (DNS) is a distributed database that allows convenient storing and retrieving of resource records. DNS has been extended to provide security services (DNSSE...
Giuseppe Ateniese, Stefan Mangard
IEEEARES
2007
IEEE
14 years 4 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul