Sciweavers

2270 search results - page 68 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SAC
2002
ACM
13 years 8 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
INTERACT
2007
13 years 10 months ago
Designing a Trade-Off Between Usability and Security: A Metrics Based-Model
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality at...
Christina Braz, Ahmed Seffah, David M'Raïhi
ICDIM
2007
IEEE
14 years 3 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
JSSPP
2005
Springer
14 years 2 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
ESAW
2006
Springer
14 years 12 days ago
Current Issues in Multi-Agent Systems Development
Abstract. This paper surveys the state-of-the-art in developing multi-agent systems, and sets out to answer the questions: "what are the key current issues in developing multi...
Rafael H. Bordini, Mehdi Dastani, Michael Winikoff