Sciweavers

IMCS
2007
78views more  IMCS 2007»
13 years 4 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
IMCS
2007
93views more  IMCS 2007»
13 years 4 months ago
Strategies for successful CRM implementation
Purpose – Customer relationship management (CRM) is an information system that tracks customers’ interactions with the firm and allows employees to instantly pull up informat...
ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newb...
IMCS
2007
77views more  IMCS 2007»
13 years 4 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
IMCS
2007
144views more  IMCS 2007»
13 years 4 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova