Sciweavers

4413 search results - page 62 / 883
» Security for biometric data
Sort
View
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 4 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 3 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
29
Voted
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 3 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
HICSS
2009
IEEE
140views Biometrics» more  HICSS 2009»
14 years 4 months ago
Infrastructure Protection in the Ancient World
This paper provides lessons learned from ancient Roman attempts to protect the aqueduct, which was considered one of their most critical infrastructures. It also offers an analogy...
Michael J. Assante
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
14 years 4 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack