Sciweavers

3149 search results - page 83 / 630
» IT security risk management
Sort
View
JUCS
2006
74views more  JUCS 2006»
13 years 9 months ago
Pervasive Health Management and Health Management Utilizing Pervasive Technologies : Synergy and Issues
: Much development work is ongoing addressing technologies and their application in the health domain, in order to achieve solutions that are non-invasive to every day life and wor...
Jean Roberts
IDTRUST
2010
ACM
14 years 3 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
CSFW
2011
IEEE
12 years 8 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
INFOCOM
2006
IEEE
14 years 3 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
ESWA
2011
220views Database» more  ESWA 2011»
13 years 15 days ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...