Sciweavers

1422 search results - page 67 / 285
» Information security and risk management
Sort
View
MACE
2009
Springer
230views Communications» more  MACE 2009»
14 years 3 months ago
Combining Learned and Highly-Reactive Management
Learned models of behavior have the disadvantage that they must be retrained after any change in system configuration. Autonomic management methods based upon learned models lose ...
Alva L. Couch, Marc Chiarini
CRITIS
2007
13 years 10 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
WIKIS
2010
ACM
13 years 6 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 9 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
ESCIENCE
2006
IEEE
14 years 3 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...