Sciweavers

95 search results - page 6 / 19
» Risk assessment in distributed authorization
Sort
View
ESCIENCE
2006
IEEE
14 years 1 months ago
Introducing Risk Management into the Grid
Service Level Agreements (SLAs) are explicit statements about all expectations and obligations in the business partnership between customers and providers. They have been introduc...
Karim Djemame, Iain Gourlay, James Padgett, Georg ...
IJNSEC
2007
95views more  IJNSEC 2007»
13 years 7 months ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
EUSFLAT
2009
187views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Intensity Assessment of Pedestrian Collisions in City of Mashhad based on Fuzzy Probabilities
Fuzzy probabilities have been widely used in the areas of risk assessment and decision making. Here, we propose a system based on fuzzy probabilities for assessing the intensity of...
Farzaneh Tatari, Mohammad R. Akbarzadeh-Totonchi
CCS
2008
ACM
13 years 9 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
COLCOM
2008
IEEE
14 years 1 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann