Sciweavers

438 search results - page 12 / 88
» Defending Critical Infrastructure
Sort
View
CSFW
1997
IEEE
13 years 11 months ago
Strategies against Replay Attacks
Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
Tuomas Aura
EUROMICRO
2009
IEEE
14 years 2 months ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 7 months ago
Modelling interdependencies between the electricity and information infrastructures
The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the ass...
Jean-Claude Laprie, Karama Kanoun, Mohamed Ka&acir...
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 2 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
FLAIRS
2001
13 years 9 months ago
An Infrastructure for Managing Knowledge Using Intelligent Workflow
Today'sbusinessenvironmentis characterizedas knowledgebeing the critical resourcefor any businessactivity. Byautomatingmanyof their routinebusinessprocesses,companiesare able...
Irma Becerra-Fernandez, Karen McCarthy, Juan Rodri...