Sciweavers

25 search results - page 4 / 5
» Model-Based Risk Assessment to Improve Enterprise Security
Sort
View
SIN
2010
ACM
13 years 6 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
ECUMN
2007
Springer
14 years 2 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
WSC
2004
13 years 10 months ago
"One" a New Tool for Supply Chain Network Optimization and Simulation
Nowadays, in a hotly competitive environment, companies are continuously trying to provide products and/or services to customers faster, cheaper, and better than the competitors d...
Hongwei Ding, Lyès Benyoucef, Xiaolan Xie, ...
COMCOM
2007
100views more  COMCOM 2007»
13 years 8 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
NSPW
2006
ACM
14 years 2 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald