Sciweavers

2403 search results - page 63 / 481
» Cyberinsurance in IT Security Management
Sort
View
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 3 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
ASIASIM
2004
Springer
14 years 2 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
CSFW
2007
IEEE
14 years 3 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
SAC
2002
ACM
13 years 9 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
ICDIM
2006
IEEE
14 years 3 months ago
Exposing Web Services to Business Partners: Security and Quality of Service Issue
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...