Sciweavers

1422 search results - page 14 / 285
» Information security and risk management
Sort
View
CSREASAM
2003
13 years 10 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
ISW
2009
Springer
14 years 3 months ago
Risks of the CardSpace Protocol
Sebastian Gajek, Jörg Schwenk, Michael Steine...
IAW
2003
IEEE
14 years 2 months ago
Methodology of Risk Assessment in Mobile Agent System Design
Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
ISSA
2004
13 years 10 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 10 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...