Sciweavers

IEEEARES
2007
IEEE
14 years 6 months ago
Aggregating and Deploying Network Access Control Policies
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
Joaquín García-Alfaro, Fréd&e...
IEEEARES
2007
IEEE
14 years 6 months ago
On the Assessment of the Interaction Quality of Users with Cerebral Palsy
This paper is the continuation of a series of related work about experimentation of alternative ways of interaction with computers for disabled people (concretely with users suffe...
Cesar Mauri, Toni Granollers, Agusti Solanas
IEEEARES
2007
IEEE
14 years 6 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
IEEEARES
2007
IEEE
14 years 6 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...
IEEEARES
2007
IEEE
14 years 6 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
IEEEARES
2007
IEEE
14 years 6 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
IEEEARES
2007
IEEE
14 years 6 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
IEEEARES
2007
IEEE
14 years 6 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt