Sciweavers

119 search results - page 5 / 24
» Organisational Information Security: A Viable System Perspec...
Sort
View
ICDS
2009
IEEE
14 years 5 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
SACMAT
2009
ACM
14 years 3 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
AISM
2004
14 years 9 days ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
IJIEM
2010
126views more  IJIEM 2010»
13 years 8 months ago
E-Health readiness framework from Electronic Health Records perspective
E-Health systems include applications of information communication technologies to promote healthcare services support, delivery and education. The success of an E-Health system i...
JunHua Li, Lesley Pek Wee Land, Pradeep Ray, Subha...
CODASPY
2011
13 years 2 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu