Sciweavers

1690 search results - page 5 / 338
» A Security Framework for JXTA-Overlay
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 1 months ago
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Anthony M. Cresswell, Shahidul Hassan
ISW
1997
Springer
13 years 11 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
IEEEARES
2007
IEEE
14 years 1 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka
CSFW
2000
IEEE
13 years 11 months ago
Possibilistic Definitions of Security - An Assembly Kit
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
Heiko Mantel