Sciweavers

2403 search results - page 86 / 481
» Cyberinsurance in IT Security Management
Sort
View
CCS
2009
ACM
14 years 11 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
MSS
2007
IEEE
76views Hardware» more  MSS 2007»
14 years 4 months ago
Implementing and Evaluating Security Controls for an Object-Based Storage System
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...
NDSS
2005
IEEE
14 years 4 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 4 months ago
Providing Transparent Security Services to Sensor Networks
— In this paper we introduce a link layer security platform for wireless sensor networks. At the heart of this platform, lies our key management module facilitating an efficient...
Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitr...
ISCIS
2005
Springer
14 years 3 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan