Sciweavers

2403 search results - page 64 / 481
» Cyberinsurance in IT Security Management
Sort
View
CRITIS
2007
13 years 10 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
UCS
2004
Springer
14 years 2 months ago
Realizing a Secure Federation of Multi-institutional Service Systems
Abstract. This paper proposes an extended framework for service provision for ubiquitous spaces based on Kerberos. The framework allows groups of services and information about ord...
Yu Enokibori, Nobuhiko Nishio
WWW
2006
ACM
14 years 10 months ago
Using semantic rules to determine access control for web services
Semantic Web technologies are bring increasingly employed to solve knowledge management issues in traditional Web technologies. This paper follows that trend and proposes using Se...
Brian Shields, Owen Molloy, Gerard Lyons, Jim Dugg...
OOPSLA
2009
Springer
14 years 3 months ago
Dependable, online upgrades in enterprise systems
Software upgrades are unreliable, often causing downtime or data loss. I propose Imago, an approach for removing the leading causes of upgrade failures (broken dependencies) and o...
Tudor Dumitras