Sciweavers

151 search results - page 6 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 24 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
IS
2007
13 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
14 years 3 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
SACMAT
2003
ACM
14 years 2 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
COMPSAC
2002
IEEE
14 years 2 months ago
Trust Services: A Framework for Service-Based Solutions
It is well understood that using a software component methodology can simplify the development and maintenance of systems. Web services allow this vision to be extended allowing c...
Adrian Baldwin, Simon Shiu, Marco Casassa Mont