Sciweavers

2403 search results - page 29 / 481
» Cyberinsurance in IT Security Management
Sort
View
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 7 months ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
STORAGESS
2006
ACM
14 years 3 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
ISPA
2005
Springer
14 years 2 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...