Sciweavers

2270 search results - page 105 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IPAW
2010
13 years 6 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
ACSAC
2008
IEEE
14 years 3 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
STORAGESS
2005
ACM
14 years 2 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
ICDCSW
2005
IEEE
14 years 2 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack