Karen Scarfone

According to our database1, Karen Scarfone authored at least 11 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Blockchain Technology Overview.
CoRR, 2019

2016
Using a Capability-Oriented Methodology to Build Your Cloud Ecosystem.
IEEE Cloud Comput., 2016

2014
A standard for developing secure mobile applications.
Comput. Stand. Interfaces, 2014

2013
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2010
Intrusion Detection and Prevention Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

2009
An analysis of CVSS version 2 vulnerability scoring.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

2008
Vulnerability scoring for security configuration settings.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Improving the Common Vulnerability Scoring System.
IET Inf. Secur., 2007

A trust domain management schema for multiple grid environments.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Access Control Policy Combinations for the Grid Using the Policy Machine.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
Common Vulnerability Scoring System.
IEEE Secur. Priv., 2006


  Loading...