Sciweavers

434 search results - page 2 / 87
» Security Documentation
Sort
View
IFIP
2001
Springer
13 years 9 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
JTAER
2008
100views more  JTAER 2008»
13 years 4 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni
CAISE
2003
Springer
13 years 10 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
EUROPKI
2005
Springer
13 years 10 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl
ICDAR
2009
IEEE
13 years 11 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder