Sciweavers

3193 search results - page 100 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
IEEECIT
2010
IEEE
13 years 6 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
SOUPS
2005
ACM
14 years 1 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
ECWEB
2004
Springer
177views ECommerce» more  ECWEB 2004»
14 years 1 months ago
Analysis of Mobile Business Processes for the Design of Mobile Information Systems
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
André Köhler, Volker Gruhn
SCANGIS
2003
13 years 9 months ago
Routing Using Geospatial Information System Analysis
A prototype least cost pipeline routing was performed using various data and GIS analysis. Ahvaz-Marun oil pipeline in south west of IRAN was chosen for development of the prototy...
Mahmoud Reza Delavar, Fereydoon Naghibi