In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...