Sciweavers

129 search results - page 8 / 26
» Guidelines for designing IT security management tools
Sort
View
DMDW
2001
232views Management» more  DMDW 2001»
14 years 11 months ago
Towards Data Warehouse Quality Metrics
Organizations are adopting datawarehouses to manage information efficiently as "the" main organizational asset. It is essential that we can assure the information qualit...
Coral Calero, Mario Piattini, Carolina Pascual, Ma...
IFIP
2001
Springer
15 years 1 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
SEC
2003
14 years 11 months ago
Assessing Security in Energy-Efficient Sensor Networks
In this paper, we describe why current research in ad hoc networks requires an effective assessment framework, and how our system profile proposal can be used for the purpose. W...
Yee Wei Law, Sandro Etalle, Pieter H. Hartel
STORAGESS
2006
ACM
15 years 3 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
ACSAC
2000
IEEE
15 years 1 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...