Sciweavers

299 search results - page 4 / 60
» Re-engineering enterprise security
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
WECWIS
2005
IEEE
131views ECommerce» more  WECWIS 2005»
14 years 2 months ago
Aspects of Trusted and Secure Business-Oriented VO Management in Service Oriented Architectures
Virtual Enterprises or Organisations (VO) have
Adomas Svirskas, Michael D. Wilson, Alvaro E. Aren...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 2 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
ACSAC
2004
IEEE
14 years 9 days ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 2 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman