Sciweavers

3193 search results - page 68 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CSFW
2008
IEEE
14 years 2 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
IMCS
2007
77views more  IMCS 2007»
13 years 7 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
DSN
2009
IEEE
13 years 5 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
CSREAEEE
2006
82views Business» more  CSREAEEE 2006»
13 years 9 months ago
User-Website Interactive Communication Analysis in Web-Based Information System Development
- Web-based information systems (WBIS) include the website part and the system part, and easy-to-use website is particular critical to the success of WBIS. This paper argues that t...
Ying Liang
ACSAC
2002
IEEE
14 years 22 days ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen