Sciweavers

295 search results - page 4 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
MKWI
2008
137views Business» more  MKWI 2008»
13 years 9 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
WETICE
2005
IEEE
14 years 1 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
SAC
2010
ACM
14 years 2 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
IEEEARES
2007
IEEE
14 years 1 months ago
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
Jimmy McGibney, Dmitri Botvich
NOMS
2006
IEEE
14 years 1 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath