Sciweavers

2270 search results - page 85 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CCS
2008
ACM
13 years 10 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
JSS
2006
118views more  JSS 2006»
13 years 8 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun
IEEEARES
2006
IEEE
14 years 2 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
ELECTRONICMARKETS
1998
134views more  ELECTRONICMARKETS 1998»
13 years 8 months ago
Agents as Mediators in Electronic Commerce
Software agents help automate a variety of tasks including those involved in buying and selling products over the Internet. This paper surveys several of these agentmediated elect...
Robert H. Guttman, Alexandros Moukas, Pattie Maes
IDTRUST
2010
ACM
14 years 3 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier