Sciweavers

147 search results - page 21 / 30
» Simplifying System Administration Tasks: The UAMS Approach
Sort
View
ACSAC
1998
IEEE
13 years 11 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
HICSS
2006
IEEE
112views Biometrics» more  HICSS 2006»
14 years 23 days ago
Tool Support for the Collaborative Design of Reference Models - A Business Engineering Perspective
The central idea in reference modeling is the reutilization of the business knowledge contained in reference models for the construction of specific information models. The orient...
Oliver Thomas, August-Wilhelm Scheer
IADIS
2003
13 years 8 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
ICDCS
1999
IEEE
13 years 11 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
FC
2010
Springer
181views Cryptology» more  FC 2010»
13 years 10 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...