Sciweavers

136 search results - page 17 / 28
» Securing interdependent assets
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 4 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
ATC
2007
Springer
14 years 3 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
DIMVA
2006
13 years 11 months ago
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime recons...
André Årnes, Paul Haas, Giovanni Vign...
SSWMC
2004
13 years 11 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
CAISE
2003
Springer
14 years 2 months ago
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications
Location tracking technologies are penetrating increasingly in industrial environments. Several challenges arise when people or mobile assets are tracked. Security is one of the ma...
Ana Isabel González-Tablas Ferreres, Benjam...