Sciweavers

1422 search results - page 42 / 285
» Information security and risk management
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
AOSE
2006
Springer
14 years 17 days ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
CHIMIT
2008
ACM
13 years 10 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CCS
2004
ACM
14 years 2 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers