Sciweavers

1353 search results - page 29 / 271
» Securing Current and Future Process Control Systems
Sort
View
CCS
2005
ACM
15 years 8 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
97
Voted
CLUSTER
2002
IEEE
15 years 7 months ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
129
Voted
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
15 years 7 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
109
Voted
PCI
2009
Springer
15 years 7 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
116
Voted
WISA
2007
Springer
15 years 8 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang