Sciweavers

3149 search results - page 146 / 630
» IT security risk management
Sort
View
162
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 4 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
104
Voted
CIS
2006
Springer
15 years 4 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
CN
2000
76views more  CN 2000»
15 years 18 days ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
90
Voted
ISW
2009
Springer
15 years 7 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
85
Voted
ISW
1999
Springer
15 years 5 months ago
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
Marc Joye, Narn-Yih Lee, Tzonelih Hwang