Sciweavers

762 search results - page 48 / 153
» Modeling and Simulating Information Security Management
Sort
View
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
MR
2007
173views Robotics» more  MR 2007»
13 years 7 months ago
A maintenance planning and business case development model for the application of prognostics and health management (PHM) to ele
- This paper presents a model that enables the optimal interpretation of Prognostics and Health Management (PHM) results for electronic systems. In this context, optimal interpreta...
Peter A. Sandborn, Chris Wilkinson
XMLSEC
2003
ACM
14 years 29 days ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
CIT
2006
Springer
13 years 11 months ago
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this pape...
Punit Rathod, Srinath Perur, Raghuraman Rangarajan
IEEEARES
2009
IEEE
14 years 2 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira