Sciweavers

1407 search results - page 89 / 282
» Systems Theory Model for Information Security
Sort
View
LOCWEB
2009
ACM
14 years 2 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
HICSS
2006
IEEE
189views Biometrics» more  HICSS 2006»
14 years 2 months ago
Barriers to Information Access across Languages on the Internet: Network and Language Effects
This paper investigates the role of language in accessing information on the Internet. We combined data about website visitors through log-file analysis with data about web-hosts ...
Anett Kralisch, Thomas Mandl
IEEEARES
2009
IEEE
14 years 2 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
ICMLA
2010
13 years 6 months ago
A Probabilistic Graphical Model of Quantum Systems
Quantum systems are promising candidates of future computing and information processing devices. In a large system, information about the quantum states and processes may be incomp...
Chen-Hsiang Yeang
WETICE
2005
IEEE
14 years 1 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick