Sciweavers

6147 search results - page 15 / 1230
» Requirements, Architectures and Risks
Sort
View
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
14 years 27 days ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
DBSEC
2010
123views Database» more  DBSEC 2010»
13 years 11 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DAC
2005
ACM
14 years 25 days ago
An effective DFM strategy requires accurate process and IP pre-characterization
Carlo Guardiani, Massimo Bertoletti, Nicola Dragon...
IEEESCC
2007
IEEE
14 years 5 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 5 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...