Sciweavers

2560 search results - page 35 / 512
» Securing VO Management
Sort
View
ACSAC
2000
IEEE
14 years 3 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
SAC
2008
ACM
13 years 10 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
IJISEC
2006
88views more  IJISEC 2006»
13 years 11 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
CIKM
2006
Springer
14 years 2 months ago
Secure search in enterprise webs: tradeoffs in efficient implementation for document level security
Document level security (DLS)
Peter Bailey, David Hawking, Brett Matson
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
14 years 5 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin