Sciweavers

3149 search results - page 69 / 630
» IT security risk management
Sort
View
CRITIS
2007
13 years 10 months ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
CRISIS
2009
13 years 10 months ago
A reference model for risk-aware business process management
The major contribution of this paper is the
Stefan Jakoubi, Simon Tjoa
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 9 months ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding
ICDCS
2010
IEEE
14 years 27 days ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
FINANCECOM
2007
Springer
209views Finance» more  FINANCECOM 2007»
14 years 3 months ago
Information Risk in Financial Institutions: Field Study and Research Roadmap
Abstract. Large financial firms with thousands of employees face many challenges ensuring workers have access to the right information, yet controlling access to unneeded data. We ...
Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M...