Sciweavers

3149 search results - page 109 / 630
» IT security risk management
Sort
View
FOSAD
2007
Springer
14 years 3 months ago
An Introduction to the Role Based Trust Management Framework RT
Marcin Czenko, Sandro Etalle, Dongyi Li, William H...
EUROSYS
2008
ACM
14 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
ACSD
2005
IEEE
114views Hardware» more  ACSD 2005»
14 years 2 months ago
Controlling Speculative Design Processes Using Rich Component Models
This paper elaborates on the application of some aspects of robust systems control theory to the management of uncertainty and risk in distributed and complex design processes, ha...
Werner Damm
CORR
2008
Springer
109views Education» more  CORR 2008»
13 years 8 months ago
EuSpRIG 2006 Commercial Spreadsheet Review
This management summary provides an outline of a commercial spreadsheet review process. The aim of this process is to ensure remedial or enhancement work can safely be undertaken ...
Simon Murphy
JNSM
2007
97views more  JNSM 2007»
13 years 9 months ago
Policy-based Management: A Historical Perspective
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...
Raouf Boutaba, Issam Aib