Sciweavers

11 search results - page 2 / 3
» aism 2004
Sort
View
AISM
2004
13 years 6 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
AISM
2004
13 years 6 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy
AISM
2004
13 years 6 months ago
Developing a framework for understanding Security Governance
With reported security incidents in organisations on the increase, effective Security Governance is expected to become a major issue in organisations. A research framework of Secu...
C. C. Terence Tan
AISM
2004
13 years 6 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
AISM
2004
13 years 6 months ago
Securing Web Services with XML aware Digital Signatures
The evolution of web services has facilitated the integration of business processes scattered across different geographical locations of the world. Along with the benefits that we...
Sabbir Ahmed, Leisa Armstrong