Sciweavers

1422 search results - page 90 / 285
» Information security and risk management
Sort
View
EEE
2005
IEEE
14 years 3 months ago
Towards Access Control for Visual Web Model Management
With the advance of E-Commerce over Web-based information, the interoperability of isolated XML repositories and databases over the Internet has drawn an increasing interest recen...
Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingh...
EGITALY
2011
12 years 9 months ago
Information Visualization on Organized Crime Trials
Today everyone on the Internet becomes an active writer. It is simpler than ever to produce and to share new knowledge on the net. Users risk to be overwhelmed by too much informa...
Lorenzo Di Silvestro, Giovanni Gallo, Giovanni Giu...
CAISE
2007
Springer
14 years 4 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
ISW
2000
Springer
14 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...
IEEECIT
2010
IEEE
13 years 8 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre