Sciweavers

3149 search results - page 76 / 630
» IT security risk management
Sort
View
ARESEC
2011
145views more  ARESEC 2011»
12 years 9 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
WSC
2007
13 years 11 months ago
Simulation of adaptive project management analytics
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...
Léa Amandine Deleris, Sugato Bagchi, Shubir...
APNOMS
2007
Springer
14 years 3 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
ENTCS
2008
83views more  ENTCS 2008»
13 years 9 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 3 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson