Sciweavers

3149 search results - page 205 / 630
» IT security risk management
Sort
View
DSOM
2008
Springer
13 years 11 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 3 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
DRM
2007
Springer
14 years 3 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
WPES
2004
ACM
14 years 3 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 9 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen