Sciweavers

3149 search results - page 88 / 630
» IT security risk management
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
IAAI
1990
13 years 10 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 10 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
ACSAC
2003
IEEE
14 years 2 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ICEIS
2002
IEEE
14 years 2 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan