Sciweavers

3149 search results - page 100 / 630
» IT security risk management
Sort
View
CLOUDCOM
2009
Springer
14 years 3 months ago
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud comp...
Siani Pearson, Yun Shen, Miranda Mowbray
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
14 years 2 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
ISSA
2004
13 years 10 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 3 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
AINA
2006
IEEE
14 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick