Sciweavers

3149 search results - page 173 / 630
» IT security risk management
Sort
View
BIRTHDAY
2009
Springer
13 years 7 months ago
Management of UML Clusters
Abstract. Software engineering uses UML diagrams as a standard technique for specification and development of software. Various UML diagrams are used for specification of different...
Peggy Schmidt, Bernhard Thalheim
INTERACT
2003
13 years 10 months ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale
ACSAC
1998
IEEE
14 years 1 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
ACSAC
2004
IEEE
14 years 1 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
APSEC
2005
IEEE
14 years 2 months ago
An Industrial Case Study on Requirements Volatility Measures
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Annabella Loconsole, Jürgen Börstler