Sciweavers

1407 search results - page 29 / 282
» Systems Theory Model for Information Security
Sort
View
CAISE
2004
Springer
14 years 1 months ago
Basic Notions Regarding Business Processes and Supporting Information Systems
Six basic notions concerning business processes and their supporting information systems are presented and discussed, on the basis of one common theory. This yields that these noti...
Jan L. G. Dietz
CCS
2007
ACM
14 years 2 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
PCI
2001
Springer
14 years 11 days ago
Communicating X-Machines: From Theory to Practice
Formal modeling of complex systems is a non-trivial task, especially if a formal method does not facilitate separate development of the components of a system. This paper describes...
Petros Kefalas, George Eleftherakis, Evangelos Keh...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
13 years 12 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
ECIS
2004
13 years 9 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett