Sciweavers

1407 search results - page 26 / 282
» Systems Theory Model for Information Security
Sort
View
JMM2
2008
84views more  JMM2 2008»
13 years 8 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
WAIM
2005
Springer
14 years 1 months ago
Integrity Theory for Resource Space Model and Its Application
The Resource Space Model (RSM) is a semantic data model based on orthogonal classification semantics for effectively managing various resources in interconnection environment. In p...
Hai Zhuge, Yunpeng Xing
JTAER
2006
100views more  JTAER 2006»
13 years 8 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 12 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...