Sciweavers

3149 search results - page 164 / 630
» IT security risk management
Sort
View
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 11 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ACSAC
2010
IEEE
13 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
ESEM
2009
ACM
14 years 3 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
CCS
2008
ACM
13 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
KES
2005
Springer
14 years 2 months ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn