IIT

Results: 1929



#Item
751Identity management / Role-based access control / Access / Access control / Security / Computer security

Author manuscript, published in "4th International Workshop on Autonomous and Spontateous Security (SETOP[removed])" Risk-based Auto-Delegation for Probabilistic Availability ? Leanid Krautsevich1 , Fabio Martinelli2 , Ch

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-03-30 08:11:45
752Computer network security / Software testing / Risk management / National security / Vulnerability / Password / Attack surface / Risk / Computer insecurity / Cyberwarfare / Computer security / Security

Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
753Identity management / XACML / Attribute grammar / Attrib / Access control / Computing / Software / Programming paradigms

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consi

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
754

ROLL NUMBER WISE LIST OF CANDIDATES CALLED FOR COMPUTER TYPING TEST FOR JUNIOR ASSISTANT TO BE HELD ON[removed]SATURDAY) AT 8.30 A.M. ONWARDS AT 1st YEAR COMPUTER LAB, DEPARTMENT OF MECHANICAL ENGINEERING, IIT(BHU) (A

Add to Reading List

Source URL: www.iitbhu.ac.in

Language: English - Date: 2015-01-28 07:25:38
    755Network theory / Hacking / Software testing / Vulnerability / Induced path / Graph / Tree / Shortest path problem / Graph theory / Mathematics / Theoretical computer science

    Determining the Probability of Smart Grid Attacks by ∗ Combining Attack Tree and Attack Graph Analysis Kristian Beckers1 , Maritta Heisel1 , Leanid Krautsevich2 , Fabio Martinelli2 , Rene Meis1 , and Artsiom Yautsiukhi

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2015-04-02 07:11:50
    756Archimedean spiral / Trigonometric functions / Spherical coordinate system / Circle / Angle / Polar coordinate system / On Spirals / Geometry / Spirals / Coordinate systems

    Microsoft Word - Spirals HO

    Add to Reading List

    Source URL: mypages.iit.edu

    Language: English - Date: 2010-08-22 18:53:18
    757Theoretical computer science / Orch-OR / Roger Penrose / Qubit / Golden ratio / Fibonacci number / Quantum computer / Mandelbrot set / Fractal / Quantum mind / Physics / Mathematics

    Seeking a “middle path” between the Orch OR & Phi-IIT positions Dear Stuart Hameroff, Some rainy day Hong Kong weekend musings for you and Dave Chalmers. Einstein to Le Corbusier on the (Fibonacci-Golden Ratio-based

    Add to Reading List

    Source URL: asynsis.files.wordpress.com

    Language: English - Date: 2014-05-31 22:47:46
    758India / Haridwar district / Indian Institute of Technology Roorkee / Roorkee / Irrigation / James Thomason / IIT Schools of Management / Indian Institute of Technology Delhi / States and territories of India / Indian Institutes of Technology / Education in India

    wrd & m Prosp[removed]cdr

    Add to Reading List

    Source URL: www.iitr.ac.in

    Language: English - Date: 2015-02-04 06:29:39
    759Transaction log / Partition coefficient / Extensible Storage Engine / Data management / Chemistry / Forestry / Logging

    Logging Key Assurance Indicators in Business Processes∗ Fabio Massacci Gene Tsudik Dipartimento di Ingegneria e

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2010-06-18 12:28:44
    760Network theory / Ring theory / Semiring / Routing algorithms / Search algorithms / Shortest path problem / A* search algorithm / Static single assignment form / External / Mathematics / Algebra / Graph theory

    A General Method for Assessment of Security in Complex Services ⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2011-08-10 05:58:47
    UPDATE