Sciweavers

762 search results - page 21 / 153
» Modeling and Simulating Information Security Management
Sort
View
CCS
2008
ACM
13 years 9 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
JUCS
2006
86views more  JUCS 2006»
13 years 7 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
CIMCA
2006
IEEE
14 years 1 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
OTM
2005
Springer
14 years 1 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
WSC
2008
13 years 10 months ago
Experience in the broadening of a single-purpose simulation model
Simulation models are often developed for a single purpose. However, once a model is accepted by management and other stake-holders, it is quite common and desirable to wish to br...
Reid L. Kress, Pete Bereolos, Karen Bills, James C...