Sciweavers

299 search results - page 19 / 60
» Re-engineering enterprise security
Sort
View
JSW
2007
141views more  JSW 2007»
13 years 9 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 4 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
ETRICS
2006
14 years 1 months ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt
ACSAC
2006
IEEE
14 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
RAID
2010
Springer
13 years 7 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...