—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Various approaches can be used to migrate legacy applications to the Web. In particular, migrating dataintensive legacy applications (e.g. traditional application for business man...
Damiano Distante, Vito Perrone, Mario A. Bochicchi...
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
With current trends towards moving variability from hardware to software, and given the increasing desire to postpone design decisions as much as is economically feasible, managin...
Rabih Bashroush, Ivor T. A. Spence, Peter Kilpatri...