Sciweavers

3149 search results - page 80 / 630
» IT security risk management
Sort
View
BIS
2007
173views Business» more  BIS 2007»
13 years 10 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
CHIMIT
2008
ACM
13 years 10 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
SCP
2002
77views more  SCP 2002»
13 years 8 months ago
Quantitative IT portfolio management
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
CSFW
2008
IEEE
14 years 3 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
AGILEDC
2007
IEEE
14 years 3 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann