Sciweavers

178 search results - page 20 / 36
» Legal Issues in Cyberspace
Sort
View
APCCM
2010
13 years 10 months ago
A conceptually rich model of business process compliance
In this paper we extend the preliminary work developed elsewhere and investigate how to characterise many aspects of the compliance problem in business process modeling. We first ...
Guido Governatori, Antonino Rotolo
DBSEC
2007
89views Database» more  DBSEC 2007»
13 years 10 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
FLAIRS
2006
13 years 9 months ago
Towards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance
In today's IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partn...
Alfred Ka Yiu Wong, Nandan Paramesh, Pradeep Kumar...
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 8 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
JCP
2007
88views more  JCP 2007»
13 years 8 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet