Sciweavers

2270 search results - page 245 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SACMAT
2010
ACM
15 years 9 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
OOPSLA
2010
Springer
15 years 2 months ago
A recommender for conflict resolution support in optimistic model versioning
The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contrad...
Petra Brosch, Martina Seidl, Gerti Kappel
ECIS
2004
15 years 6 months ago
Measuring enterprise systems success: the importance of a multiple stakeholder perspective
: Organisations invest enormous amount of resources in acquiring Enterprise Systems (ES), presumably expecting positive impacts to the organisation and its functions. Despite the o...
Darshana Sedera, Guy G. Gable, Taizan Chan
CCS
2008
ACM
15 years 6 months ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
ACSAC
2009
IEEE
15 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...