Sciweavers

3149 search results - page 114 / 630
» IT security risk management
Sort
View
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 3 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
DEBU
2007
131views more  DEBU 2007»
13 years 9 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
MACE
2009
Springer
230views Communications» more  MACE 2009»
14 years 3 months ago
Combining Learned and Highly-Reactive Management
Learned models of behavior have the disadvantage that they must be retrained after any change in system configuration. Autonomic management methods based upon learned models lose ...
Alva L. Couch, Marc Chiarini
ICSM
2005
IEEE
14 years 2 months ago
A Case Study of the Release Management of a Health-care Information System
This paper describes a case study of the release management of CS-ECIS, a health-care information system developed by the Dutch software vendor ChipSoft. We performed this case st...
Gerco Ballintijn
MOBIS
2008
13 years 10 months ago
Policy-Based Semantic Compliance Checking for Business Process Management
: Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed a...
Marwane El Kharbili, Sebastian Stein