Sciweavers

2270 search results - page 286 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
WEBI
2009
Springer
15 years 11 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
IEEEARES
2007
IEEE
15 years 11 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
DISCEX
2003
IEEE
15 years 10 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
114
Voted
DAGSTUHL
2007
15 years 6 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese