Sciweavers

536 search results - page 26 / 108
» Embedding Information Security into the Organization
Sort
View
ISI
2005
Springer
14 years 1 months ago
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide de...
Gregory J. Conti, Mustaque Ahamad, Robert Norback
IH
1998
Springer
14 years 11 days ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
STEP
2005
IEEE
14 years 1 months ago
Adoption-Centric Software Maintenance Process Improvement via Information Integration
Software process improvement is an iterative activity, normally involving measurement, analysis, and change. For most organizations, the existing software process has substantial ...
Shihong Huang, Scott R. Tilley, Michael VanHilst, ...
CMOT
2002
90views more  CMOT 2002»
13 years 8 months ago
Organizational Design, Information Transfer, and the Acquisition of Rent-Producing Resources
Within the resource-based view of the firm, a dynamic story has emerged in which the knowledge accumulated over the history of a firm and embedded in organizational routines and s...
Michael J. Lenox
DAC
2005
ACM
14 years 9 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede