Sciweavers

1422 search results - page 121 / 285
» Information security and risk management
Sort
View
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software metrics: roadmap
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Norman E. Fenton, Martin Neil
CCS
2005
ACM
14 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
DOLAP
2000
ACM
14 years 2 months ago
Towards OLAP Security Design - Survey and Research Issues
With the use of data warehousing and online analytical processing (OLAP) for decision support applications new security issues arise. The goal of this paper is to introduce an OLA...
Torsten Priebe, Günther Pernul
SAFECOMP
2010
Springer
13 years 8 months ago
Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace
Unmanned Airborne Systems (UAS) offer significant benefits for long duration missions. They can also be used in situations where it is inappropriate to expose aircrew to increased ...
Christopher W. Johnson
SISW
2005
IEEE
14 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...