-
1
-
-
70549084398
-
-
INFOSEC Research Council November
-
INFOSEC Research Council. Hard problem list (November 2005), http://www.cyber.st.dhs.gov/docs/IRC-Hard-Problem-List.pdf
-
(2005)
Hard Problem List
-
-
-
2
-
-
32644465248
-
-
U.S. Secret Service and CERT Coordination Center Software Engineering Institute
-
Randazzo, M.R., Keeney, M., Kowalski, E., Cappelli, D., Moore, A.: Insider threat study: Illicit cyber activity in the banking and finance sector. U.S. Secret Service and CERT Coordination Center Software Engineering Institute (2004)
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
3
-
-
78449292551
-
-
Technical Report SAND2006-6399, Sandia National Laboratories October
-
DePoy, J., Phelan, J., Sholander, P., Smith, B.J., Varnado, G.B., Wyss, G.D., Darby, J., Walter, A.: Critical infrastructure systems of systems assessment methodology. Technical Report SAND2006-6399, Sandia National Laboratories (October 2007)
-
(2007)
Critical Infrastructure Systems of Systems Assessment Methodology
-
-
DePoy, J.1
Phelan, J.2
Sholander, P.3
Smith, B.J.4
Varnado, G.B.5
Wyss, G.D.6
Darby, J.7
Walter, A.8
-
5
-
-
84884385328
-
Containment: From context awareness to contextual effects awareness
-
Proceedings of 2nd Inernational Workshop on Software Aspects of Context
-
Dragovic, B., Crowcroft, J.: Containment: from context awareness to contextual effects awareness. In: Proceedings of 2nd Inernational Workshop on Software Aspects of Context. CEUR Workshop Proceedings (2005)
-
CEUR Workshop Proceedings (2005)
-
-
Dragovic, B.1
Crowcroft, J.2
-
7
-
-
0000372791
-
Klaim: A kernel language for agents interaction and mobility
-
De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: A kernel language for agents interaction and mobility. IEEE Transactions on software engineering 24(5), 315-330 (1998) (Pubitemid 128741958)
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
De Nicola, R.1
Ferrari, G.L.2
Pugliese, R.3
-
8
-
-
35248866884
-
Resource access and mobility control with dynamic privileges acquisition
-
Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. Springer, Heidelberg
-
Gorla, D., Pugliese, R.: Resource access and mobility control with dynamic privileges acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol. 2719, pp. 119-132. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2719
, pp. 119-132
-
-
Gorla, D.1
Pugliese, R.2
-
9
-
-
0036040231
-
An infrastructure language for open nets
-
ACM, New York
-
Bettini, L., Loreti, M., Pugliese, R.: An infrastructure language for open nets. In: SAC 2002: Proceedings of the 2002 ACM Symposium on Applied Computing, pp. 373-377. ACM, New York (2002)
-
(2002)
SAC 2002: Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 373-377
-
-
Bettini, L.1
Loreti, M.2
Pugliese, R.3
-
10
-
-
38149049950
-
Where can an insider attack?
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
-
Probst, C.W., Hansen, R.R., Nielson, F.: Where can an insider attack? In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 127-142. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4691
, pp. 127-142
-
-
Probst, C.W.1
Hansen, R.R.2
Nielson, F.3
-
11
-
-
84885588046
-
On the inability of existing security models to cope with data mobility in dynamic organizations
-
Proceedings of theWorkshop on Modeling Security
-
Dimkov, T., Tang, Q., Hartel, P.H.: On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of theWorkshop on Modeling Security. CEUR Workshop Proceedings (2008)
-
CEUR Workshop Proceedings (2008)
-
-
Dimkov, T.1
Tang, Q.2
Hartel, P.H.3
-
12
-
-
84864565207
-
The reality of risks from consented use of usb devices
-
Valli, C., Woodward, A. (eds.)
-
AlZarouni, M.: The reality of risks from consented use of usb devices. In: Valli, C., Woodward, A. (eds.) Proceedings of the 4th Australian Information Security Conference, pp. 5-15 (2006)
-
(2006)
Proceedings of the 4th Australian Information Security Conference
, pp. 5-15
-
-
AlZarouni, M.1
|