نتایج جستجو برای: security model

تعداد نتایج: 2246841  

2012
Julian Schütte Roland Rieke Timo Winkelvos

With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of potential security breaches. Security Information and Event Management systems which aim at collecting, aggregating and processing securityrelevant information are therefore on the rise. However, the event model of current systems mostly describes network events and th...

1997
Will Marrero Edmund Clarke Somesh Jha

As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to insure some kind of acceptable behavior even in the presence of malicious intruders becomes paramount. People have looked to cryptography to help solve many of these problems. However, cryptography itself is only a tool....

2011
Jörn Eichler Roland Rieke

Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. To tackle this complexity, the application of models in pre-operational phases is becoming standard practice. Runtime models are also increasingly applied to analyze and validate the actual security status of business process instances. In this pape...

Journal: :international journal of environmental research 2014
c. shao y. guan c. chu r. shi m. ju

the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...

1998
John K. Ousterhout Jacob Y. Levy Brent B. Welch

Safe-Tcl is a mechanism for controlling the execution of programs written in the Tcl scripting language. It allows untrusted scripts (applets) to be executed while preventing damage to the environment or leakage of private information. Safe-Tcl uses a padded cell approach: each applet is isolated in a safe interpreter where it cannot interact directly with the rest of the application. The execu...

2004
TERESA F. LUNT DOROTHY E. DENNING ROGER R. SCHELL MARK HECKMAN WILLIAM R. SHOCKLEY

A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having different clearances. This paper describes a formal security model for a such a system. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension...

2001
Christos Ilioudis George Pangalos Athena Vakali

The significance of XML technology for sharing data over the Internet is being rapidly recognised. In this paper, we examine the security problems related to XML data and present our approach, the XML Security model, for enforcing security policies in XML based Information systems. Our methodology has been based on the study of the XML data model, on the identification of the security requireme...

Journal: :JIPS 2009
Reijo Savola

We introduce a novel high-level security metrics objective taxonomization model for software-intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emph...

Journal: :Information & Software Technology 2002
Gail-Joon Ahn Seng-Phil Hong Michael Eonsuk Shin

Role-based access control (RBAC) is a flexible approach to access control, which has generated great interest in the security community. The principal motivation behind RBAC is to simplify the complexity of administrative tasks. Several formal models of RBAC have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily und...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید