Sciweavers

3149 search results - page 146 / 630
» IT security risk management
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 28 days ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
CIS
2006
Springer
14 years 28 days ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
CN
2000
76views more  CN 2000»
13 years 9 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
ISW
2009
Springer
14 years 3 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...