Sciweavers

3149 search results - page 222 / 630
» IT security risk management
Sort
View
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
14 years 3 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
DISCEX
2003
IEEE
14 years 3 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
ICDCSW
2002
IEEE
14 years 2 months ago
Switchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and S...
Eric Freudenthal, Lawrence Port, Tracy Pesin, Edwa...
BCSHCI
2008
13 years 11 months ago
Helping users create and remember more secure text passwords
This doctoral research aims to persuade users to choose and remember more secure text passwords. The first component involved user studies demonstrating that users can be persuade...
Alain Forget
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 10 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum