Sciweavers

1795 search results - page 53 / 359
» Security Models and Information Flow
Sort
View
126
Voted
ISTA
2004
15 years 5 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
95
Voted
ICEIS
2010
IEEE
15 years 1 months ago
A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems
Roberto Baldoni, Giorgia Lodi, Gregory Chockler, E...
119
Voted
CSE
2009
IEEE
15 years 10 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
113
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
118
Voted
SIGITE
2005
ACM
15 years 9 months ago
Integration of information assurance and security into the IT2005 model curriculum
In this paper we present the context of the work of the Curriculum Committee on IT2005, the IT curriculum volume described in the Overview Draft document of the Joint Task Force f...
Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lun...