Sciweavers

136 search results - page 16 / 28
» Securing interdependent assets
Sort
View
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
14 years 1 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
SAC
2009
ACM
14 years 4 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
IEEEARES
2008
IEEE
14 years 4 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
ISSA
2008
13 years 11 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 4 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags