Sciweavers

762 search results - page 79 / 153
» Modeling and Simulating Information Security Management
Sort
View
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
CONTEXT
2007
Springer
14 years 2 months ago
Activity Systems and Context Working as Core Concepts in Modeling Socio-Technical Systems
Current modeling approaches in the field of learning and work resemble the notion of workflows and hence fall short in describing the situated and socially mediated nature of pract...
Heidrun Allert, Christoph Richter
IEEEARES
2008
IEEE
14 years 2 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul