Sciweavers

3193 search results - page 28 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
RE
2005
Springer
14 years 1 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
SACMAT
2003
ACM
14 years 28 days ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
13 years 11 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...