A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
[chapter]
2007
Lecture Notes in Computer Science
We introduce an intruder model that provides an open-ended base for the integration of multiple attack tactics. ...
Thus, the analyst can express e-commerce security guarantees that are not restricted to the absence of secrecy and the absence of authentication failures. ...
[9] or other e-commerce security guarantees. ...
doi:10.1007/978-3-540-75101-4_22
fatcat:na45z2pwazcghefu2rhzk2wmai
Intrusion Response Systems: A Survey
[chapter]
2008
Network Security Desk Reference
replicas, and intrusion response for specific classes of attacks. ...
Protecting networks from computer security attacks is an important concern of computer security. ...
important transactions in e-commerce system
Table 2 : 2 List of security goals for e-commerce testbed ...
doi:10.1016/b978-0-12-374463-0.00010-2
fatcat:4wmfeklxqjfmvfrejpjt4aa65a
Intrusion Response Systems: A Survey
[chapter]
2008
Information Assurance
replicas, and intrusion response for specific classes of attacks. ...
Protecting networks from computer security attacks is an important concern of computer security. ...
important transactions in e-commerce system
Table 2 : 2 List of security goals for e-commerce testbed ...
doi:10.1016/b978-012373566-9.50015-x
fatcat:tlmg46x475gp3maja6ytpzgope
Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review
[article]
2014
arXiv
pre-print
These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. ...
In this paper, we attempt to present steps for a systematic design of trust management systems for WSNs. In addition, we address the techniques followed by scholars in implementing trust frameworks. ...
In addition, we discuss state-of-the-art trust management frameworks for secure routing, data aggregation and intrusion detection. ...
arXiv:1406.3204v2
fatcat:z2gdqcywwbgtla4ojysyagv2fm
Incident response requirements for distributed security information management systems
2007
Information Management & Computer Security
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1108/09685220710759568
fatcat:jvv2mu43xbbinn6loslb32tkei
Information Management
[chapter]
2011
Practical Risk Management for the CIO
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1201/b10874-20
fatcat:jadtv5zg2zgizhd2xy2tt3rdyu
Information Management
[chapter]
2013
Encyclopedia of Systems Biology
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1007/978-1-4419-9863-7_100690
fatcat:cchbrfoegbarlndogkftvbwplq
Information Management
[chapter]
2000
Economics of Information Technology and the Media
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1142/9789810248574_0008
fatcat:t6teoo6nl5gl3cgbl5zb6tvh6a
Information Management
[chapter]
2015
Delivering Business Analytics
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1002/9781119203674.ch10
fatcat:n57wbnktnzcnxll2zm2b533iba
Information management
1978
Computer Communications
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1016/0140-3664(78)90065-8
fatcat:fowxhstsvvbepgb3pll4ufsepe
12. Information management
2009
Handbook of Practice Management
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1258/rsmhpm.12-01
fatcat:skvbwzfw4rhr7cwpb7ggvqf5pe
12. Information Management
2013
Handbook of Practice Management
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1258/sphpm.12-01
fatcat:kz5ht3j3hnfa3kmu7cak2xwzu4
8. Information Management
[chapter]
2009
Mathematical Techniques in Finance
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1515/9781400831487-010
fatcat:sw33li7yz5fydoagwluncssfei
Information management
1995
Nature
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1038/373728a0
fatcat:mkuvx4iixfhv3mrfvl2d3n7nca
Information Management
[chapter]
2016
Tribal Business School
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents. ...
series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. ...
This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475). ...
doi:10.1002/9781119206385.ch6
fatcat:2gkli5s4yfc7vf52z6hvgw3eiu
« Previous
Showing results 1 — 15 out of 2,492 results