Sciweavers

3149 search results - page 115 / 630
» IT security risk management
Sort
View
CCS
2001
ACM
14 years 1 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
14 years 25 days ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 9 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
ICSEA
2009
IEEE
14 years 3 months ago
A Software Requirements Change Source Taxonomy
— Requirements changes during software development pose a risk to cost, schedule and quality while at the same time providing an opportunity to add value. Provision of a generic ...
Sharon McGee, Des Greer
SECURWARE
2008
IEEE
14 years 3 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...