Sciweavers

2403 search results - page 354 / 481
» Cyberinsurance in IT Security Management
Sort
View
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
13 years 8 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
JCP
2006
98views more  JCP 2006»
13 years 8 months ago
Testing Event-Driven Business Processes
Today's business climate requires to constantly evolve IT strategies for responding to new opportunities or threats. While the fundamentals of IT -- reliability, availability,...
Josef Schiefer, Gerd Saurer, Alexander Schatten
CCS
2006
ACM
14 years 23 hour ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ISN
1999
Springer
139views Communications» more  ISN 1999»
14 years 17 days ago
Simplifying Real-Time Multimedia Application Development Using Session Descriptions
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
Sarom Ing, Steve Rudkin
DRM
2008
Springer
13 years 10 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...