Sciweavers

4330 search results - page 26 / 866
» Analyzing security architectures
Sort
View
CCS
2006
ACM
13 years 11 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
IEEEARES
2008
IEEE
14 years 1 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
JNSM
2010
110views more  JNSM 2010»
13 years 2 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
WICON
2008
13 years 8 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...