Sciweavers

94 search results - page 1 / 19
» Towards Data Protection Compliance
Sort
View
SECRYPT
2010
98views Business» more  SECRYPT 2010»
13 years 8 months ago
Towards Data Protection Compliance
Nicola Zannone, Milan Petkovic, Sandro Etalle
CCS
2008
ACM
14 years 26 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 5 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ESORICS
2009
Springer
14 years 11 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li