Sciweavers

1407 search results - page 35 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
1999
IEEE
139views Biometrics» more  HICSS 1999»
14 years 8 days ago
Five Degrees of Separation: A Human Capital Model of Employment-Related Decisionmaking in the Information Technology Workforce
Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
Robert A. Josefek Jr., Robert J. Kauffman
ICWS
2008
IEEE
13 years 9 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
APSEC
2003
IEEE
14 years 1 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
POPL
2007
ACM
14 years 8 months ago
Assessing security threats of looping constructs
There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pi...
Pasquale Malacaria
OTM
2005
Springer
14 years 1 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert