Sciweavers

1422 search results - page 91 / 285
» Information security and risk management
Sort
View
CCS
2008
ACM
14 years 2 days ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ISI
2005
Springer
14 years 3 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...
WWW
2006
ACM
14 years 10 months ago
Archiving web site resources: a records management view
In this paper, we propose the use of records management principles to identify and manage Web site resources with enduring value as records. Current Web archiving activities, coll...
Maureen Pennock, Brian Kelly
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 2 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
SAC
2010
ACM
14 years 4 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz