Sciweavers

2337 search results - page 10 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
JNW
2008
126views more  JNW 2008»
13 years 7 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
JUCS
2006
117views more  JUCS 2006»
13 years 7 months ago
Information and Hybrid Architecture Model of the OCP Contextual Information Management System
: This paper describes OCP (Open Context Platform), a middleware which provides support for management of contextual information and merging of information from different sources. ...
Ignacio Nieto-Carvajal, Juan A. Botía Blaya...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 1 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
DAWAK
2009
Springer
13 years 5 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...