Sciweavers

2560 search results - page 27 / 512
» Securing VO Management
Sort
View
ACMSE
2006
ACM
14 years 5 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CRITIS
2007
14 years 15 days ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
IEEEARES
2006
IEEE
14 years 5 months ago
Secure Business Process Management: A Roadmap
— The security of corporate business processes is crucial for the business success of companies. Existing Business Process Management methodologies barely consider security and d...
Thomas Neubauer, Markus D. Klemen, Stefan Biffl
NOMS
2000
IEEE
14 years 3 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt