Sciweavers

3149 search results - page 102 / 630
» IT security risk management
Sort
View
CORR
2006
Springer
96views Education» more  CORR 2006»
13 years 9 months ago
The Evolution of Cyberinsurance
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to ear...
Ruperto P. Majuca, William Yurcik, Jay P. Kesan
SOSP
2003
ACM
14 years 6 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
IEEEIAS
2008
IEEE
14 years 3 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
ESORICS
2009
Springer
14 years 9 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
ISF
2007
104views more  ISF 2007»
13 years 9 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager