Sciweavers

1422 search results - page 38 / 285
» Information security and risk management
Sort
View
ICSE
2009
IEEE-ACM
13 years 6 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
CIKM
2006
Springer
14 years 17 days ago
Secure search in enterprise webs: tradeoffs in efficient implementation for document level security
Document level security (DLS)
Peter Bailey, David Hawking, Brett Matson
NSPW
2004
ACM
14 years 2 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
LOCA
2009
Springer
14 years 3 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
SECURWARE
2007
IEEE
14 years 3 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck