Sciweavers

IRI
2006
IEEE
14 years 5 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
IPCCC
2006
IEEE
14 years 5 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
IPCCC
2006
IEEE
14 years 5 months ago
AWARDS: an adaptive write strategy for secure local disk systems
Since security is of critical importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increasing number of sec...
Mais Nijim, Xiao Qin, Tao Xie 0004, Mohammed I. Al...
IPCCC
2006
IEEE
14 years 5 months ago
SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...
Tao Xie 0004, Xiao Qin, Mais Nijim
IEEEARES
2006
IEEE
14 years 5 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
IEEEARES
2006
IEEE
14 years 5 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
IEEEARES
2006
IEEE
14 years 5 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
IEEEARES
2006
IEEE
14 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
ESCIENCE
2006
IEEE
14 years 5 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
CSFW
2006
IEEE
14 years 5 months ago
Securing Interaction between Threads and the Scheduler
The problem of information flow in multithreaded programs remains an important open challenge. Existing approaches to specifying and enforcing information-flow security often su...
Alejandro Russo, Andrei Sabelfeld