Sciweavers

2560 search results - page 27 / 512
» Securing VO Management
Sort
View
114
Voted
ACMSE
2006
ACM
15 years 8 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
122
Voted
CRITIS
2007
15 years 4 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
109
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
86
Voted
INTERFACES
2008
101views more  INTERFACES 2008»
15 years 2 months ago
Hypo International Strengthens Risk Management with a Large-Scale, Secure Spreadsheet-Management Framework
Yusuf Jafry, Christopher Marrison, Ulrike Umkehrer...
121
Voted
NOMS
2000
IEEE
15 years 7 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt