Sciweavers

11 search results - page 2 / 3
» Managing Security Threats and Vulnerabilities for Small to M...
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 2 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
PROFES
2004
Springer
13 years 10 months ago
Using Software Inspection as a Catalyst for SPI in a Small Company
Process improvement activities in small and medium size enterprises (SME) are challenging due to small number of personnel and projects, people have to perform in a variety of role...
Lasse Harjumaa, Ilkka Tervonen, Pekka Vuorio
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 2 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
13 years 11 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...