Sciweavers

2403 search results - page 97 / 481
» Cyberinsurance in IT Security Management
Sort
View
PLDI
2006
ACM
14 years 4 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
CSREASAM
2003
13 years 11 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
AGENTS
1999
Springer
14 years 2 months ago
Agent Development with Jackal
Jackal is a Java-based tool for communicatingwith the KQML agent communication language. Some features that make it extremely valuable to agent development are its conversation ma...
R. Scott Cost, Timothy W. Finin, Yannis Labrou, Xi...
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 5 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
ICDCSW
2005
IEEE
14 years 4 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer