Sciweavers

98 search results - page 1 / 20
» Best Practices for Building a Security Operations Center
Sort
View
ISJGP
2006
82views more  ISJGP 2006»
13 years 11 months ago
Best Practices for Building a Security Operations Center
Diana Kelley, Ron Moritz
PERCOM
2007
ACM
14 years 10 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CIIT
2004
132views Communications» more  CIIT 2004»
14 years 9 days ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
EGOV
2007
Springer
14 years 5 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song