Sciweavers

1422 search results - page 33 / 285
» Information security and risk management
Sort
View
ITRUST
2005
Springer
14 years 2 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
EUROSYS
2008
ACM
14 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
IV
2006
IEEE
124views Visualization» more  IV 2006»
14 years 2 months ago
The Making of Trigger and the Agile Engineering of Artist-Scientist Collaboration
The agile process approach used in software engineering was adapted as a foundation for the management of the multimedia art installation project titled "Trigger." By be...
Francis T. Marchese
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 8 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
CMS
2006
127views Communications» more  CMS 2006»
13 years 10 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis