Sciweavers

762 search results - page 29 / 153
» Modeling and Simulating Information Security Management
Sort
View
CCGRID
2002
IEEE
14 years 19 days ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
CONTEXT
2007
Springer
14 years 1 months ago
Investigating the Specifics of Contextual Elements Management: The CEManTIKA Approach
In times where users need to process an ever increasing amount of
Vaninha Vieira, Patricia Azevedo Tedesco, Ana Caro...
ICISS
2005
Springer
14 years 1 months ago
VTrust: A Trust Management System Based on a Vector Model of Trust
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
EUROSEC
2010
ACM
14 years 29 days ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani