Sciweavers

2403 search results - page 57 / 481
» Cyberinsurance in IT Security Management
Sort
View
IEEEARES
2006
IEEE
14 years 3 months ago
Testing Complex Business Process Solutions
—Today’s business climate requires you to constantly evolve IT strategies responding to new opportunities or threats. While the fundamentals of IT - reliability, availability, ...
Gerd Saurer, Alexander Schatten
AINA
2007
IEEE
14 years 3 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 9 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
SAC
2010
ACM
14 years 4 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
DISCEX
2003
IEEE
14 years 2 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker