Sciweavers

2403 search results - page 458 / 481
» Cyberinsurance in IT Security Management
Sort
View
CAISE
2009
Springer
13 years 12 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
COMPSAC
2007
IEEE
13 years 12 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
CIKM
2009
Springer
13 years 12 months ago
A co-classification framework for detecting web spam and spammers in social media web sites
Social media are becoming increasingly popular and have attracted considerable attention from spammers. Using a sample of more than ninety thousand known spam Web sites, we found ...
Feilong Chen, Pang-Ning Tan, Anil K. Jain
EATIS
2007
ACM
13 years 12 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
ICDCS
2010
IEEE
13 years 12 months ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu