Sciweavers

831 search results - page 28 / 167
» A Security Concept for OLAP
Sort
View
IFIP
2001
Springer
14 years 1 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
ISCI
2008
104views more  ISCI 2008»
13 years 8 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
EMISA
2004
Springer
14 years 2 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
VAMOS
2007
Springer
14 years 2 months ago
KumbangSec: An Approach for Modelling Functional and Security Variability in Software Architectures
Software products often need to vary in terms of functionality, but also in terms of quality attributes. We describe KumbangSec, which in an approach for modelling functional and ...
Varvana Myllärniemi, Mikko Raatikainen, Tomi ...
COMPSAC
2006
IEEE
14 years 15 days ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba