Sciweavers

2270 search results - page 100 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PLDI
2009
ACM
14 years 3 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
IPPS
2007
IEEE
14 years 3 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
EDOC
2002
IEEE
14 years 1 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
14 years 5 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 2 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh