Sciweavers

340 search results - page 31 / 68
» How Should Control and Body Systems Be Coupled
Sort
View
146
Voted
SEDE
2010
15 years 2 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
CN
1999
115views more  CN 1999»
15 years 4 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
15 years 10 months ago
The Role of Perceived Control, Attention-Shaping, and Expertise in IT Project Risk Assessment
This study investigates how individuals assess risks in IT development projects under different conditions. We focus on three conditions: the perceived control over the IT project...
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen,...
ICPADS
2005
IEEE
15 years 10 months ago
A Differentiated Message Delivery Architecture to Control Spam
Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. In this paper we argue ...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
SDMW
2004
Springer
15 years 10 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...