Sciweavers

1795 search results - page 54 / 359
» Security Models and Information Flow
Sort
View
COMPSEC
2010
86views more  COMPSEC 2010»
13 years 9 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....
LISA
2004
13 years 11 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ASIASIM
2004
Springer
14 years 3 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
SIN
2009
ACM
14 years 4 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...