Sciweavers

18697 search results - page 23 / 3740
» Systemic Security Management
Sort
View
ETS
2002
IEEE
144views Hardware» more  ETS 2002»
15 years 3 months ago
Creating Shared Knowledge: Instructional Knowledge Management Systems
Document management, information management, and knowledge management are three processes of an instructional knowledge management system (IKMS) that require different ways of thi...
Gerald S. Edmonds, Rob Pusch
205
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 7 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
MAS
1998
Springer
152views Communications» more  MAS 1998»
15 years 8 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
122
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Policy-Based Management: Bridging the Gap
In a policy-based system, policy goals are described with respect to network entities (e.g., networks and users) instead of enforcement points (e.g., firewalls and routers). This ...
Susan Hinrichs
176
Voted
VIZSEC
2004
Springer
15 years 9 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee