Filters








2,492 Hits in 5.2 sec

Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees [chapter]

Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
2007 Lecture Notes in Computer Science  
We introduce an intruder model that provides an open-ended base for the integration of multiple attack tactics.  ...  Thus, the analyst can express e-commerce security guarantees that are not restricted to the absence of secrecy and the absence of authentication failures.  ...  [9] or other e-commerce security guarantees.  ... 
doi:10.1007/978-3-540-75101-4_22 fatcat:na45z2pwazcghefu2rhzk2wmai

Intrusion Response Systems: A Survey [chapter]

J JOSHI
2008 Network Security Desk Reference  
replicas, and intrusion response for specific classes of attacks.  ...  Protecting networks from computer security attacks is an important concern of computer security.  ...  important transactions in e-commerce system Table 2 : 2 List of security goals for e-commerce testbed  ... 
doi:10.1016/b978-0-12-374463-0.00010-2 fatcat:4wmfeklxqjfmvfrejpjt4aa65a

Intrusion Response Systems: A Survey [chapter]

Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi, Eugene H. Spafford
2008 Information Assurance  
replicas, and intrusion response for specific classes of attacks.  ...  Protecting networks from computer security attacks is an important concern of computer security.  ...  important transactions in e-commerce system Table 2 : 2 List of security goals for e-commerce testbed  ... 
doi:10.1016/b978-012373566-9.50015-x fatcat:tlmg46x475gp3maja6ytpzgope

Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review [article]

Raghu Vamsi. P, Krishna Kant
2014 arXiv   pre-print
These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage.  ...  In this paper, we attempt to present steps for a systematic design of trust management systems for WSNs. In addition, we address the techniques followed by scholars in implementing trust frameworks.  ...  In addition, we discuss state-of-the-art trust management frameworks for secure routing, data aggregation and intrusion detection.  ... 
arXiv:1406.3204v2 fatcat:z2gdqcywwbgtla4ojysyagv2fm

Incident response requirements for distributed security information management systems

Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris
2007 Information Management & Computer Security  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1108/09685220710759568 fatcat:jvv2mu43xbbinn6loslb32tkei

Information Management [chapter]

2011 Practical Risk Management for the CIO  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1201/b10874-20 fatcat:jadtv5zg2zgizhd2xy2tt3rdyu

Information Management [chapter]

2013 Encyclopedia of Systems Biology  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1007/978-1-4419-9863-7_100690 fatcat:cchbrfoegbarlndogkftvbwplq

Information Management [chapter]

2000 Economics of Information Technology and the Media  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1142/9789810248574_0008 fatcat:t6teoo6nl5gl3cgbl5zb6tvh6a

Information Management [chapter]

2015 Delivering Business Analytics  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1002/9781119203674.ch10 fatcat:n57wbnktnzcnxll2zm2b533iba

Information management

1978 Computer Communications  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1016/0140-3664(78)90065-8 fatcat:fowxhstsvvbepgb3pll4ufsepe

12. Information management

2009 Handbook of Practice Management  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1258/rsmhpm.12-01 fatcat:skvbwzfw4rhr7cwpb7ggvqf5pe

12. Information Management

2013 Handbook of Practice Management  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1258/sphpm.12-01 fatcat:kz5ht3j3hnfa3kmu7cak2xwzu4

8. Information Management [chapter]

2009 Mathematical Techniques in Finance  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1515/9781400831487-010 fatcat:sw33li7yz5fydoagwluncssfei

Information management

Brendan Norton
1995 Nature  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1038/373728a0 fatcat:mkuvx4iixfhv3mrfvl2d3n7nca

Information Management [chapter]

2016 Tribal Business School  
This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1002/9781119206385.ch6 fatcat:2gkli5s4yfc7vf52z6hvgw3eiu
« Previous Showing results 1 — 15 out of 2,492 results