Sciweavers

2270 search results - page 379 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
105
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
117
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment
Event trees are a popular technique for modelling accidents in system safety analyses. Bayesian networks are a probabilistic modelling technique representing influences between unc...
George Bearfield, William Marsh
120
Voted
PVLDB
2010
129views more  PVLDB 2010»
15 years 2 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
ICDCS
2009
IEEE
16 years 28 days ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
110
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer