In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...