In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Business visualization is becoming increasingly important, since managers recognize the power of human visual intuition in information-rich decision tasks. Nevertheless, despite i...