Sciweavers

1005 search results - page 51 / 201
» Information systems security engineering: a critical compone...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
CGO
2005
IEEE
14 years 2 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
SAC
2009
ACM
14 years 1 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Performance Evaluation and Prediction for Legacy Information Systems
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Yan Jin, Antony Tang, Jun Han, Yan Liu
CAD
2004
Springer
13 years 8 months ago
A concurrent engineering-oriented design database representation model
A concurrent engineering-oriented design database representation model (CE-DDRM) is introduced in this research for supporting various life-cycle aspects in concurrent design. In ...
Deyi Xue, Haoguang Yang