Sciweavers

497 search results - page 29 / 100
» A knowledgeable security model for distributed health inform...
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
CIMCA
2006
IEEE
14 years 2 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
INFOCOM
2005
IEEE
14 years 2 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
HICSS
2000
IEEE
169views Biometrics» more  HICSS 2000»
14 years 1 months ago
A Software System for Spatial Data Analysis and Modeling
Advances in geographical information systems (GIS) and supporting data collection technology has resulted in the rapid collection of a huge amount of spatial data. However, known ...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
CCS
2005
ACM
14 years 2 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi