Sciweavers

3149 search results - page 78 / 630
» IT security risk management
Sort
View
EUROPKI
2004
Springer
14 years 2 months ago
Using LDAP Directories for Management of PKI Processes
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP server...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
SECURWARE
2008
IEEE
14 years 3 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
CONTEXT
2007
Springer
14 years 3 months ago
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Kayo Sakamoto, Masanori Nakagawa
CSREASAM
2007
13 years 10 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
ECOOPW
1998
Springer
14 years 1 months ago
Secure Recording of Itineraries through Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and o...
Volker Roth