Sciweavers

2270 search results - page 167 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
100
Voted
AMC
2006
76views more  AMC 2006»
15 years 3 months ago
Integrating GPS with national networks by collocation method
In the integration of geodetic networks with different geodetic coordinate systems, the similarity transformation seems to be the most suitable method because the geodetic coordin...
Hakan S. Kutoglu, Tevfik Ayan, Ç. Mekik
131
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
135
Voted
ICWS
2004
IEEE
15 years 5 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
119
Voted
ICDCS
2006
IEEE
15 years 9 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
124
Voted
ESORICS
2004
Springer
15 years 9 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan