Sciweavers

2403 search results - page 6 / 481
» Cyberinsurance in IT Security Management
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
IEEEARES
2006
IEEE
14 years 2 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
NOMS
2000
IEEE
14 years 9 days ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
ISI
2007
Springer
14 years 2 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
IDTRUST
2010
ACM
14 years 2 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier