Sciweavers

299 search results - page 3 / 60
» Re-engineering enterprise security
Sort
View
ACSAC
2000
IEEE
14 years 29 days ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
TRUSTBUS
2007
Springer
14 years 2 months ago
On Device-Based Identity Management in Enterprises
Marco Casassa Mont, Boris Balacheff
WISA
2005
Springer
14 years 2 months ago
Key Factors Influencing Worm Infection in Enterprise Networks
Urupoj Kanlayasiri, Surasak Sanguanpong
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 6 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ESSOS
2011
Springer
13 years 1 days ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr