Sciweavers

2403 search results - page 62 / 481
» Cyberinsurance in IT Security Management
Sort
View
CHIMIT
2008
ACM
13 years 11 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
IEEEIAS
2007
IEEE
14 years 3 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
DISCEX
2003
IEEE
14 years 2 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
ICDCSW
2002
IEEE
14 years 2 months ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...