Sciweavers

325 search results - page 13 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 2 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White
ICEIS
2002
IEEE
14 years 16 days ago
Mediated Communication in Groupware Systems
: In the creation of groupware systems, a good design of communication mechanisms, required by the group in order to carry out its work, is essential, since there are many other de...
Luis A. Guerrero, Sergio F. Ochoa, Oriel A. Herrer...
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
EUROPLOP
2006
13 years 9 months ago
Business Logic in the Presentation Layer - Design Patterns on the Implementation of Business Logic on the Client-Side
Abstract: As a general rule of thumb, business logic in a multi-layered information system should be implemented in a dedicated domain layer and be separated from the presentation ...
Tim Wellhausen
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr