Sciweavers

152 search results - page 11 / 31
» Modeling dependencies in security risk management
Sort
View
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
IDTRUST
2010
ACM
14 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
ISF
2006
118views more  ISF 2006»
13 years 9 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
MACE
2009
Springer
230views Communications» more  MACE 2009»
14 years 4 months ago
Combining Learned and Highly-Reactive Management
Learned models of behavior have the disadvantage that they must be retrained after any change in system configuration. Autonomic management methods based upon learned models lose ...
Alva L. Couch, Marc Chiarini