Sciweavers

1795 search results - page 54 / 359
» Security Models and Information Flow
Sort
View
85
Voted
COMPSEC
2010
86views more  COMPSEC 2010»
15 years 3 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....
89
Voted
TISSEC
2002
63views more  TISSEC 2002»
15 years 3 months ago
An authorization model for temporal and derived data: securing information portals
Vijayalakshmi Atluri, Avigdor Gal
137
Voted
LISA
2004
15 years 5 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
149
Voted
ASIASIM
2004
Springer
15 years 9 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
145
Voted
SIN
2009
ACM
15 years 10 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...