Sciweavers

2337 search results - page 63 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
DAC
1995
ACM
13 years 11 months ago
Benchmarking An Interdisciplinary Concurrent Design Methodology for Electronic/Mechanical Systems
The paper describes the evolution of an Interdisciplinary Concurrent Design Methodology (ICDM) and the metrics used to compare four generations of wearable computer artifacts prod...
Asim Smailagic, Daniel P. Siewiorek, Drew Anderson...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 9 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
ECSCW
1993
13 years 9 months ago
TOSCA Providing organisational information to CSCW applications
: Most cooperation support systems require information about the organisational context in which they are used. This is particularly required when systems are used in a large organ...
Wolfgang Prinz
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
CCS
1994
ACM
13 years 11 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford