Sciweavers

1422 search results - page 45 / 285
» Information security and risk management
Sort
View
CHI
2007
ACM
14 years 9 months ago
Mobile kits and laptop trays: managing multiple devices in mobile information work
A study at a large IT company shows that mobile information workers frequently migrate work across devices (here: smartphones, desktop PCs, laptops). While having multiple devices...
Antti Oulasvirta, Lauri Sumari
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
13 years 9 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 3 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
ACSAC
2000
IEEE
14 years 1 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
CSFW
2008
IEEE
14 years 3 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...